The majority of breaches affecting organisations of all sizes exploit gaps that are well-understood, technically preventable, and consistently present because identifying and closing them requires sustained operational discipline rather than technical sophistication. The gaps are not secrets. Attackers know where to look because the gaps are documented in the same public frameworks — NCSC, NIST, MITRE ATT&CK — that defenders use. The question is whether the defender has addressed them before the attacker finds them.
01
Credential compromise through phishing and password reuse
The most common initial access vector. A user is phished. Their credentials are captured. Those credentials work on multiple systems because the user reused the password. MFA was either not deployed or was bypassed using a real-time phishing proxy that captures the MFA token alongside the password. The attacker now has valid credentials to multiple systems and appears in logs as a legitimate user.
Frequency
Credential compromise accounts for 86% of web application breaches (Verizon DBIR). 61% of breaches involve credential data. Real-time phishing proxies have made MFA bypass accessible to non-sophisticated attackers — OTP-based MFA is no longer adequate for high-value accounts.
Controls that address this
Phishing-resistant MFA (FIDO2/passkeys) for all privileged and high-value accounts. Conditional access policies that evaluate device health and location at authentication time. Privileged Identity Management with just-in-time access elevation. Credential exposure monitoring against breach databases. User risk scoring in SIEM fed by authentication anomaly detection.
02
Cloud misconfiguration exposing storage, databases, or management interfaces
Storage buckets with public read access. Databases with no IP restriction on management ports. Management interfaces (Kubernetes API servers, cloud console, RDP) exposed to the internet. Security groups that permit inbound access from 0.0.0.0/0. These misconfigurations are introduced at deployment — when the team is focused on making the application work, not on the security baseline — and are then not caught because there is no automated check against a defined security standard.
Frequency
99% of cloud security breaches caused by customer misconfiguration (Gartner). Automated scanning tools allow attackers to enumerate public cloud resources across all three major providers in under an hour. A misconfigured S3 bucket or publicly accessible RDS instance is discovered by automated scanners typically within minutes of creation.
Controls that address this
Cloud Security Posture Management (CSPM) with continuous configuration assessment against a defined security baseline. Policy-as-code that prevents non-compliant infrastructure from being deployed. Security baseline enforced at the landing zone level — misconfiguration is blocked, not just detected. Automated remediation for defined misconfiguration categories. Weekly human review of CSPM findings that automated remediation did not resolve.
03
Unpatched systems exploited through known vulnerabilities
Vulnerabilities with public CVEs and working exploit code, unpatched for weeks or months after disclosure. Organisations that lack a structured patching programme — where patches are applied on an ad-hoc basis when someone remembers, rather than on a defined schedule with tracked compliance — consistently carry a backlog of critical vulnerabilities. The attacker does not need a zero-day when the target is running a version of software whose exploits are published on GitHub.
Frequency
60% of breaches involved a vulnerability for which a patch was available but not applied (Ponemon Institute). Mean time to exploit a critical vulnerability after public disclosure: 15 days. Mean time to patch in most organisations: 60+ days. The window of exposure is typically 45 days of known, exploitable vulnerability.
Controls that address this
Vulnerability management programme with defined SLAs by severity: Critical (CVSS 9+) patched within 24–48 hours; High within 7 days; Medium within 30 days. Automated patch deployment for operating system and common application patches. Exception register for systems that cannot be patched — compensating controls defined and implemented for each exception. Continuous vulnerability scanning, not point-in-time assessments.
04
Lateral movement after initial access — no network segmentation
An attacker who has compromised one endpoint or one credential can, in a flat network, reach every other system. No segmentation limits the blast radius of the initial compromise. The attacker moves laterally from the initial foothold — typically a user endpoint — to higher-value systems: domain controllers, database servers, backup infrastructure. The attack on the high-value target begins weeks after the initial compromise, after the attacker has mapped the network and identified the path of least resistance to their objective.
Frequency
Attacker dwell time before detection: industry average 21 days. In that 21-day window, lateral movement is the primary activity. A segmented network limits the blast radius of the initial compromise to the segment — the attacker must re-compromise to move between segments, which generates more detectable activity and limits the scale of damage achievable before detection.
Controls that address this
Network segmentation aligned to data sensitivity and system criticality: production separated from management, user endpoints separated from servers, backup infrastructure on an isolated segment with no inbound connections from the production network. Zero-trust network access for remote users: no split tunnelling, all traffic through inspection. East-west traffic monitoring between segments with alerting on anomalous traffic patterns. Micro-segmentation for high-criticality workloads.
05
Supply chain compromise through a trusted third party
The target organisation’s security controls are adequate. Their managed service provider, software vendor, or technology supplier’s controls are not. The attacker compromises the supplier — gaining access to the tools, credentials, or software update mechanisms the supplier uses to service the target — and uses that access to reach the target through a trusted, authenticated channel. The target’s monitoring does not flag the access because it appears to come from a trusted source using valid credentials.
Frequency
Supply chain attacks increased 742% between 2019 and 2022 (Sonatype). SolarWinds, Kaseya, MOVEit — each affected thousands of organisations through a single compromised supplier. DORA Article 28 and NIS2 Article 21 both impose explicit third-party security risk management obligations — the regulatory framing now matches the threat reality.
Controls that address this
Third-party risk register with security assessment per supplier, tiered by access level and data exposure. Contractual security requirements for suppliers with privileged access: minimum security standards, right to audit, incident notification obligations within 24 hours. Network segmentation that limits what a compromised supplier can reach. Privileged access management for supplier accounts: just-in-time access, session recording, approval workflow for sensitive operations. Software bill of materials (SBOM) for critical applications.
06
Ransomware deployment after prolonged dwell time
Ransomware is almost never deployed immediately after initial access. The typical sequence: initial compromise (phishing or exploitation), credential harvesting, lateral movement, privilege escalation, backup discovery and destruction or encryption of backup infrastructure, then ransomware deployment across all accessible systems simultaneously. The 21-day average dwell time exists because the attacker needs it to complete this sequence. An organisation that detects and responds to any step in the chain before the final deployment prevents the ransomware. Most organisations detect it at or after the deployment step.
Frequency & Cost
Active ransomware groups increased 49% year-on-year (IBM X-Force 2026). Healthcare is the most targeted sector. Average ransom demand for mid-market organisations: £350,000–£2M. Average total cost including downtime, recovery, and reputational damage: 5–10× the ransom. 65% of organisations that pay the ransom experience a subsequent attack within 12 months.
Controls that address this
Each step of the attacker’s sequence has a detection opportunity: credential harvesting detected by impossible travel and anomalous authentication alerts; lateral movement detected by east-west traffic monitoring and endpoint behavioural detection; privilege escalation detected by privileged account monitoring; backup access detected by backup infrastructure access alerts. Immutable, air-gapped backup architecture (see
Disaster Recovery Architecture) limits blast radius even if deployment succeeds. Incident response playbook for ransomware-specific scenarios with pre-approved isolation decisions.
07
Insider threat — intentional or negligent
Insider threat is the category most organisations underinvest in because it is uncomfortable to address and because preventive controls constrain legitimate user behaviour. The negligent insider — the user who emails a client dataset to a personal email address to work from home, or who clicks a phishing link despite training — is statistically far more common than the malicious insider. Both create equivalent exposure. Organisations that do not monitor for data exfiltration patterns because “we trust our employees” are making a statement about trust that is simultaneously reasonable and security-irrelevant.
Frequency & Cost
Insider threat incidents increased 44% over the past two years (Ponemon). Average cost per insider incident: £11.4M for large organisations. 56% of insider incidents are negligent (not malicious) — the most preventable category. Negligent insider incidents are entirely preventable by technical controls; malicious insider incidents require a combination of technical controls and behavioural monitoring.
Controls that address this
Data Loss Prevention (DLP) policies on email and cloud storage: large volume transfers, sensitive data patterns, transfers to personal accounts flagged and where appropriate blocked. User and Entity Behaviour Analytics (UEBA) baseline individual behaviour and alert on deviations: unusual access times, unusual data access volumes, unusual application usage. Privileged user monitoring with session recording for accounts with administrative access. Joiners/movers/leavers process with immediate access revocation on departure — the most commonly neglected control.
08
Incident response that makes the breach worse
The initial breach is one cost. The response to the breach is a second, frequently larger cost. An uncoordinated response where the IT team isolates systems without following a documented sequence destroys forensic evidence. A public statement issued before the scope of the breach is understood creates false representations that must later be corrected. A decision to pay the ransom made under panic rather than following a pre-approved decision framework creates additional exposure. An organisation without a tested incident response plan is not just unprepared for the breach — it is unprepared for the response, which is where most of the controllable cost is.
Cost of poor response
IBM Cost of a Data Breach Report: organisations with a tested incident response plan save an average of £1.5M per breach compared to organisations without one. The saving comes primarily from faster containment, faster notification (reducing regulatory fine exposure), and fewer decisions made under panic that must subsequently be reversed. ICO enforcement: failure to notify within 72 hours of becoming aware of a breach is an independent violation — the cost of a poor notification response is separate from the cost of the breach itself.
Controls that address this
Incident response plan with defined scenarios, response sequences, and pre-approved decision authorities. Specific playbooks for ransomware, data breach, insider incident, and third-party compromise — each with different response sequences and different notification obligations. Tabletop exercises run under realistic pressure conditions — not facilitated discussions, but scenario-driven exercises with time constraints. ICO and regulatory notification timelines pre-coded into the response framework. Ransom payment decision framework approved by the board before it is ever needed.