Even with a robust email security perimeter in place, attackers can try to bypass it and operate inside your network. When you analyze the anatomy of most successful cyberattacks, nearly all of them have one thing in common. Some user, somewhere, did something that could have been avoided.
source
