When a user’s privacy is compromised using non-technical means—including something as normal as receiving a call while at the office—hackers can easily acquire sensitive information. They might pretend they work in IT when in reality they’re attempting to gain access to the company’s network through one of its employees.