When conducting post-mortem analysis, it becomes apparent that the majority of today’s data breaches are not highly sophisticated. Cyber-criminals no longer hack into enterprise networks, they simply log in using weak, stolen, or otherwise compromised credentials.