An employee leaving a password on a sticky note by their monitor also counts. What Is Targeted in Data Breaches? When a hacker makes a cyberattack, they’re usually gunning for any sensitive data they can find—anything that can either be used to steal immediately (like payment information...