The Difficulties of Threatspotting [INFOGRAPHIC]
According to the Verizon 2014 Data Breach Investigative Report, 76 percent of data breaches involved the use of stolen credentials. If breaches where hackers entering a network using valid credentials have become such a common occurrence, why aren’t security teams doing more to improve their threatspotting capabilities?
Without the use of behavior analytics to monitor the actions and movements of valid credentials in a network, a hacker can easily move undected – even in places where the credential set wouldn’t regularly frequent. Our latest infographic shows how hackers move laterally through a network and elevate their privileges to obtain the confidential information they are after.