Investigate the three common methods for initial access in cyberattacks and how best to mitigate cyber threats to an organization.
https://www.securitymagazine.com/articles/96879-initial-access-in-cyberattacks-common-adversary-methods-and-mitigation-strategies