The commonest Hazard vector to get a security compromise is e mail gateways. Hackers create intricate phishing strategies employing recipients’ personalized details and social engineering techniques to trick them and direct them to destructive Internet sites. Use Recurrent backups. You need to routinely again up and encrypt your info. https://ieeexplore.ieee.org/document/9941250