of data breaches involve stolen passwords still in use by their legitimate owner
of security breaches involve people with access to privileged credentials