New variants of criminal activities are constantly being developed to illegally obtain information and data, highly developed technologies, processes, patents and customer information. The motives lie in the realisation of financial gain or the acquisition of power.
Employees at all hierarchical levels with their diverse business and private social contacts offer a broad attack surface, all the more so as companies are focussing heavily on securing their IT systems against cyberattacks. The exploited vulnerability, the user himself, is increasingly becoming the focus of attackers. People and their behaviour therefore pose the greatest risk to a company.