As highlighted in the 2017 Verizon Data Breach Investigation Report (DBIR), 75% of attacks come from the outside and a whopping 81% of hacking-related breaches leveraged either stolen and/or weak passwords. While the specific tactics may vary, the stages of an outsider attack are similar and usually follow four steps, says Brad Hibbert, Lead Solutions Strategist at BeyondTrust.