According to the Verizon 2014 Data Breach Investigative Report, 76 percent of data breaches involved the use of stolen credentials. If breaches where hackers entering a network using valid credentials have become such a common occurrence, why aren’t security teams doing more to improve their threatspotting capabilities?

Without the use of behavior analytics to monitor the actions and movements of valid credentials in a network, a hacker can easily move undected – even in places where the credential set wouldn’t regularly frequent. Our latest infographic shows how hackers move laterally through a network and elevate their privileges to obtain the confidential information they are after. 

More like this

If you’d like to see more content like this, subscribe to the Exabeam Blog