As more and more organizations become reliant on their email to conduct business, cyber criminals are putting in overtime trying to access databases and find additional email addresses to exploit....