A detailed look in to how the most seemingly innocent everyday activities in an organization can be the beginning of a major data breach. this article/story details how the user is always the weakest link in most cyber crime incidences.