IB Times: Attackers can obtain access privileges and access protected data by using nothing more than knowledge of common Windows protocols, basic social engineering and readily-available software.
Research by Imperva has found that data breaches which are commonly called Advanced Persistent Threats (APTs) are often achieved by relatively simple (and commonly available) means, requiring very basic technical skills.