Once attackers have obtained access, they can compromise other systems or pivot within your networks.