While a large percentage of the information technology security budgets is devoted to decreasing the risk of malicious attacks, there exist other ways in which systems or data become damaged. Specify the threats are you aware of when it comes to your personal systems and systems at your job?