Some attacks can take a matter of seconds to perform.
For example, someone impersonating tech support asks an employee for their password to fix their computer.
Other attacks can take months or longer, such as threat actors monitoring an employee's social media.
The employee might post a comment saying they've gotten a temporary position in a new role at the company.
An attacker might use an opportunity like this to target the temporary worker, who is likely to be less knowledgeable about security procedures.