Threat Intelligence Signature based intrusion detection is one of the most commonly used methodologies of threat intelligence, but it is not effective on all types of threats, weaknesses, and vulnerabilities. Accidental data leakage This is also called a Data Breach, when sensitive data is transmitted or viewed by an unauthorized individual. Malware Trojans, ransomware, office-gated malware, worms, viruses, etc. Identity Theft Falsely using someone else's private information for personal gain. Malicious access of data An employee's device ( personal devices) has been misplaced or stolen, exposing private data. Insider Threat Stealing sensitive corporate data for business advantage or personal gain. Weak passwords Single points of verification like passwords can easily be bypassed by savvy hackers. Social engineering Hackers manipulate employees into installing malware on their own systems. Loss/corruption of data The integrity of your data has been compromised somewhere in the writing, reading, storage, transmission, or processing cycle. Misconfigured systems A web server, app, or plug-in has been misconfigured in a way that inadvertently leaks info or allows hackers an entry point into your business's software or OS. Outdated operating system Operating systems advance annually to adapt to new security needs. Lack of encryption Not encrypting your data is the equivalent of leaving your wallet in an unlocked car with the windows down. Equipment failures Hackers locate a flaw, glitch, or weakness in your business's software or OS and create exploits to target those vulnerabilities. Unpatched vulnerabilities Vulnerabilities arise with every software addition to your environment. Untrained employees No security feature can account for human error.