incident response Common initial attack vectors How attackers are most apt to get into target companies’ infrastructure.