Almost every cybersecurity breach or incident can be traced back to something that happened on an endpoint. Source