Examples
• SpiderLabs found 45% of compromises used remote access applications
• 90% of breaches exploited vendor default settings or weak passwords
• Access to a trusted hotel network allowed the attack to spread to trusting networks
• Use of RAM parses to grab unencrypted data
• Use of malware