The attackers are organized and persistent, and are
looking for information they can resell in the form of credit card
numbers, Social Security Numbers, government secrets, Personally
Identifiable Information (PII), and other proprietary information.
This Personally Identifiable Information, as well as intellectual
property and government secrets, resides in the database.