It all starts off innocently. An office worker clicks open the inbox and sees an e-mail purporting to be from a friend, or a familiar address such as a social networking site.
The link is opened and a torrent of digital trouble is unleashed in the form of worms, viruses, malware and other programs that can take over a computer network.
At one end of the scale, it may be spyware from a legitimate company gathering information about sites visited or browsing habits. In more extreme cases, that link to a funny video or offer of prize money could leave offices vulnerable to hackers intending to infect a network, or criminals gathering information such as passwords to bank accounts and client details.
In the 1970s, office managers mainly concerned themselves with physical security and relied on locks and keys while keeping an eye on suspicious activity. Now, vigilance extends to watching over virtual private networks and using content filters to monitor Web activity.
According to NetWitness, which provides network security for government agencies and companies in the United States, nearly 2,500 hackers in Europe and China successfully gained access to a wide array of data, from credit card transactions to intellectual property, in attacks co-ordinated globally from late 2008 to early this year. The US Department of Defense (DoD) has also charted the growth of malicious cyber activity.
Ploys enticing computer users to click on links ranged from e-mail attachments, or adverts claiming to clean up viruses, to phishing links for fake websites urging users to update details such as passwords and addresses.