Gone are the days when the person hacking into your company’s data is sitting alone in a dark basement. More than likely the culprit is a sophisticated and organized threat actor.