From helpnetsecurity.com
IT departments tend to be concerned primarily with cybersecurity attacks that originate from outside the enterprise, known as a “north-south” attacks. This often leaves them more vulnerable to even more dangerous attackers who use phishing, malware or click-bait to access desktops, laptops and other endpoints.
They then use these compromised endpoints as beachheads for moving laterally from server to server throughout the enterprise. These “east-west” attacks have led to some of the world’s highest-profile and most damaging data breaches.