Discuss and describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator prevent this type of attach from happening?

Discuss and describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator prevent this type of attach from happening?