Common initial attack vectors

How attackers are most apt to get into target companies’ infrastructure.