Threats: Code Injection, Hacking, Malware, Weakness in Cybersecurity Policies, Human Error, Natural Disasters and Power Failures, Phishing, Latency, Denial-of-Service and Distributed Denial-of-Service attacks, Outdated Hardware and Unpatched Software, Ransomware, Man-in-the-Middle attacks, Keyloggers, Insider Threats and Data Spills.