Internet vulnerabilities
Network open to anyone
Size of Internet means abuses can have wide impact
Use of fixed Internet addresses with permanent connections to Internet eases identification by hackers
E-mail attachments
E-mail used for transmitting trade secrets
IM messages lack security, can be easily intercepted