Half Protected is Half Empty, Not Half Full
Threat actors tend to focus on the human element as the weakest link in the cyber-attack chain, often using stolen, weak, default, or otherwise compromised credentials to gain access to their victim’s environment.
Read more: Half Protected is Half Empty, Not Half Full
Story added 8. January 2020, content source with full text you can find at link above.