1. Acts of human error
Step-by-step explanation:
Insecurity their are many threats that make a desktop or workstation or laptop. Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.
End-users have made sure all required service is activated and running in the organization.
The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.