It's about "user education". You can only put so much into place, as far as...services, or settings, systems, software. The term "hardening" is a bit too...assuming. At the end of the day, the majority of it relies on "human behavior".
As for the term "Hacking"....I also LOL at how much it's become "over used". Myself...I lean towards the concept of "breaking in due to leveraging exploits, back doors, etc". But...technically....the actual definition of hacking is "Unauthorized access to a network(s)/computer system(s) for some illicit purpose". The term "unauthorized" can be interchanged with "without permission". Now...here is where it gets "gray". Some people will argue "But...the end user let them in, by answering the Phish, or by clicking the PDF, or...by installing that app and clicking "allow" without reading the fine print!. Well...the end user was "tricked". OK..the end user was an idiot, was stupid, careless, whatever. For the purpose of the definition, the end user did not intentionally knowingly invite the bad guy in...they just...didn't slow down to "think". So Sally at the front desk, who doesn't slow down to examine any phishing email that asks for her password...fell to the phish, "technically" she opened the door for the bad guy, unknowingly. But she did not call up the hacker from Afghanistan and say "Here Achmed....is the Administrator password for our 365 account...I give it to you so you can break in".
The majority of malware, ransomware, etc....gets into business systems due to human error >80% of the time....I think more like..in the high 80's % of the time. Yes, we've had recent actual "exploit" waves, such as the recent Exchange "Hafnium" one. To me that is a good old classic example of a hacked system. Or recently we got called in by a business that was still on SBS2011...and their network was crushed because their server got poached and was running "cldap reflecton DDoS attacks". <==turned into a juicy migration to 365 and monthly MSP client.
Part of what we do is do a "security presentation" to clients. I bring my laptop and project to a big screen TV in a conference room or wherever they do their "all staff meetings". I also have a little mini projector I can plug into my laptop if the client doesn't have a big screen in a conference room, I can just project on a wall. It's a good "value add" for your clients on monthly plans. Or you can charge for one for clients not on a plan. People tend to "know" the term phishing, but...when you show them many..many examples, and tell stories about basically what happens behind the scenes, giving examples....you see a light bulb go on above their head. And they tend to "get it". Helps a lot.
You can only do so much. Even clients that you've put on MFA....those authenticator apps...we all know a few end users who are capable of say..standing in line at the grocery store, their authenticator asks to "allow or deny"..and by habit they'll just hush it with "allow".