get in, get access, exfiltrate. that's the modern steps. sounds simple. let's take a look at that most sophisticated attack that happened last year. the most sophisticated attack. now, mind you, this attack went against a company that has the, that produces the algorithms and has the back end system that generates that random number, right? if you can get access to that generator of random numbers and you can figure out customers of this company's, some of their key members' four-digit additional password, you could actually marry those, okay? that's the sophistication of this attack. so the target was a human vulnerability, this organization out of asia targeted this company, a security company and was targeting a finance department. they sent in an e-mail to the mid-level finance manager. microsoft outlook handled that e-mail appropriately. it actually put it in the junk mailbox. it recognized it as potential spam. the problem was this business user's curiosity got the best of him, what's in my junk e-mail folder, opened that up. mistake number one. wha