Here is how hackers use publicly available employee data in the form of digital footprints and breadcrumbs to illegally access company systems.