Cybersecurity: Perpetrator Profiles and the Threats to Companies