When developing cybersecurity programs, it’s important to consider what happens when a threat bypasses perimeter defenses and targets an employee in the form of a malicious email or text.