Unauthorised access to systems
Sabotage
Malware
Theft of devices
Loss of Customer Data
Accidental loss of customer data
Hacking