Which of the following threats are most likely to occur in the event of a phishing attack? Select all that apply.
- Malicious software being deployed
- Overtaxing systems with too many internal emails
- Theft of the organization’s hardware
- Employees inadvertently revealing sensitive data