Take for example a worker who is doing some data entry on her computer. In the background, a hacker is going through the private files of her company in an unauthorised manner. He then sells the crucial information he has obtained to criminals, who use it