The report says that the #1 attack vector is through vulnerabilites in application software: Quicktime, Acrobat, MS office, etc. Victims inadvertently download attacks from a compromised trusted site. The report goes on to detail how this attack is used to gain access to other systems and exfiltrate data. It’s interesting reading.
Top Cyber Security Risks — Not What You Think
NetCraftsmen®