0
There’s an email in your inbox from someone you know. The sender asks you for sensitive information and you send it without any hesitation because you trust them. Shortly after, you realize that the information has been exposed or used to compromise an account.