According to Brian Chappell, of BeyondTrust, targeted threats are thankfully, relatively rare, and often not that dissimilar to the 'drive-by' attacks that are common. "Initial contact with the hacker will often come in the form of a scan probing the defences to look for the easily accessible vulnerabilities.