Theme Description

Frequency

%

Participants’ input

Customer data manipulation

2

14%

Shared technology vulnerabilities

8

57%

Data segregation

3

21%