Threat attackers can own your data in just two days