Home Hacking Why user behavior is the primary entry point for cyberattacks