Business Computers and Networks are Vulnerable to Infiltration