The Post Breach Industry Report reveals what attackers do inside a network once they evade perimeter defenses.