We all have carefully evaluated anti-malware solutions and implemented those that we found to best fit our needs, but regardless of your choice, some malware is most likely still getting around your controls. Attackers are clever and stealthy, and use sophisticated evasion techniques to avoid detection.
This article discusses attack vectors and how attackers worm their ways onto our networks despite our best efforts at keeping them out.