Step 1: Entry point is through email that includes a link or document leading to a hijacked website
82% of malicious websites are hacked legitimate sites (Source: SOPHOS)
Step 2: The email includes deceiving message forces individuals to open the link or document, tricking them it’s important or personal