• Malware attacks
  • Data breach
  • Identity theft
  • Misuse of Personal Identifiable Information (PII)
  • Financial theft
  • Hacking