
Whether it's critical data on people, processes or things, what most organizations have in common is that, if they cannot protect this information, the results could be fines or inability to do business and that can directly translate to harm to people and organizations.
There are so many ways to protect information (or to fail at protecting information), some more complicated than others.
One very simple way that information can be breached, disclosed or otherwise lost is through unattended, unlocked devices. For example, someone leaves a laptop logged in, screen unlocked and walks away - someone else can take that laptop and would have access to any data it has. This is also true for desktop workstations. In this case the computer won't likely be taken, but if the workstation is unattended and unlocked, anyone else can access the data on that machine leading to potential breaches and regulatory problems.