In these attacks, which are also used against individuals, hackers typically impersonate a person in authority to direct someone less senior to take actions that unwittingly rob the organization, for example, to wire funds to a fraudulent account or to purchase gift cards. While these attacks rely on faith in an organization’s hierarchy, they also use carefully harvested personal and business details to give the directive added credibility and authority. Attackers may also lure victims to click on an attachment that downloads malware to compromise the user’s device and potentially the entire network.