In many instances, information threats don't seem outlandish—they align with normal business operations, expected behavior ...