Why is it crucial not to assume the source of a data breach is either internal or external without investigation?

(Select The Best Answer)