Verizon Analysis: Top 10 Causes Behind Data Breaches

10. Shell Services

Once attackers have access to a corporate network, shell services like SSH and RPC are used to move laterally through an organization, Verizon said. The encryption protocols were also used to export stolen data out of a network. Mitigating the threat involves using one of the 20 Critical Controls; organizations can limit network ports, protocols and services, conservatively applying device configuration, Verizon said.

Get a roundup of CRN's security coverage right to your inbox with the Security Advisor newsletter.