. Attackers can also gather other information from social networking sites that can indirectly be used in attacks on an enterprise. For example, an employee may post details about changes to the company’s internal software or hardware profile that may give an attacker insight into which technologies to target in an attack.