External threats arise from malicious actors outside an organization who attempt to gain unauthorized access to networks, systems, and sensitive data. Typically, they use system vulnerabilities to gain initial access then give themselves additional privileges so that they can achieve their objectives.