{"id":4702,"date":"2024-10-07T09:08:51","date_gmt":"2024-10-07T09:08:51","guid":{"rendered":"https:\/\/www.pax8.com\/blog\/?p=4702"},"modified":"2024-10-08T16:55:25","modified_gmt":"2024-10-08T16:55:25","slug":"how-to-avoid-insider-threats","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/","title":{"rendered":"The call is coming from inside the house: how to avoid insider threats"},"content":{"rendered":"<p>You get the call: There\u2019s been a security breach. You round up the usual suspects, like ransomware, denial of service, or another cybercrime. Once you\u2019ve found the cause, it\u2019s time to find the culprit, and it dawns on you: The breach came from inside! It\u2019s none other than an insider threat, one of the most insidious cyber threats out there.<\/p>\n<p>Despite their difficult nature and unpredictability, insider threats can be thwarted with some clever moves. In this blog, we explore strategies for dealing with insider threats.<\/p>\n<h2>What is an insider threat?<\/h2>\n<p>You might think of an insider threat like a double agent, the trusted employees, contractors, and business partners who know where the skeletons are buried. And while that may be true in some cases, most of the time, insider threats come from employees who by accident open the organization up to cybercrime. They might click on a fraudulent link, accidentally leak data, or fall for a phishing scam, for example. Whichever avenue an insider threat takes, they\u2019re the ones who can make your cybersecurity team lose sleep at night.<\/p>\n<h2>Why is it important to protect against insider threats?<\/h2>\n<p>Insider breaches have had big-time costs for organizations of all sizes. According to one <a href=\"https:\/\/ponemonsullivanreport.com\/2023\/10\/cost-of-insider-risks-global-report-2023\/\" target=\"_blank\" rel=\"noopener\">report<\/a>, insider threats that result in breaches cost organizations an average of $16.2 million, a 40% increase from four years ago. That cost is inclusive of spent resources, wasted employee time, lost opportunity costs, and potential profit losses.<\/p>\n<p>There are also less tangible but still vital <a href=\"https:\/\/hbr.org\/2014\/09\/the-danger-from-within\" target=\"_blank\" rel=\"noopener\">reasons<\/a> to protect against inside jobs. These include preventing against the loss of sensitive data, reputational damage, disruption of business operations, and legal and regulatory consequences.<\/p>\n<h2>How can an insider breach accidentally happen?<\/h2>\n<p>Here\u2019s a scary thought: Nearly anyone in an organization has the potential to pose an insider threat. That\u2019s because anyone who has access to personnel, facilities, information, data, or equipment and systems can potentially cause a breach, whether intentionally or not.<\/p>\n<p>The following are some <a href=\"https:\/\/1technation.com\/cybersecurity-navigating-the-risks-of-outsider-and-insider-threats\/\" target=\"_blank\" rel=\"noopener\">scenarios<\/a> in which an organization can fall victim to an unintentional insider threat:<\/p>\n<ul>\n<li>A healthcare professional received an email from an unknown sender and opened the email \u2014 in doing so, was a victim of phishing.<\/li>\n<li>On a business trip, an employee uses a hotel\u2019s open Wi-Fi network that falls victim to a cyber heist, leaving company information up for grabs.<\/li>\n<li>An employee is working at a coffee shop and leaves their computer unattended without logging out. That trip to pick up a scone or a fresh cup of coffee could leave their device open to prying eyes.<\/li>\n<li>A healthcare professional has a hospital system open but gets pulled away for an emergency, leaving sensitive patient information visible to unauthorized individuals \u2014and, possibly, shady characters who could use that information.<\/li>\n<\/ul>\n<p>The list goes on and on of possibilities when it comes to employees accidentally leaving themselves vulnerable to attack. That\u2019s why it\u2019s important to make your clients and their employees aware of the dangers that await if they leave themselves unprotected.<\/p>\n<h2>What are some examples of intentional insider threats?<\/h2>\n<p>There are notable <a href=\"https:\/\/www.ibm.com\/topics\/insider-threats\" target=\"_blank\" rel=\"noopener\">times<\/a> when someone on the inside has intentionally made things sticky for their organizations\u2014with potentially scary ramifications. Just as the COVID-19 pandemic began, a disgruntled former employee at a medical packing company used admin access to set up a fake new user account, then altered thousands of files to delay or stop shipments of personal protective equipment. And Canada\u2019s largest credit union, <a href=\"https:\/\/www.proofpoint.com\/us\/threat-reference\/insider-threat\" target=\"_blank\" rel=\"noopener\">Desjardins<\/a>, saw a malicious insider unlawfully copy customer data, costing them $108 million to mitigate the breach.<\/p>\n<p>Through these examples of ne\u2019er-do-well-ers who sought to cause harm, it\u2019s actually more common for this sort of thing to happen by accident. One <a href=\"https:\/\/www2.dtexsystems.com\/2023ponemonreport\" target=\"_blank\" rel=\"noopener\">report<\/a> found that 55% of insider security incidents resulted from careless or negligent employees. So, whether someone\u2019s fingers slip on their mouse or purposefully pushes the organization over the edge, the damage can be substantial, either way.<\/p>\n<h2>How can I protect my business and clients from insider threats?<\/h2>\n<p>There are a number of <a href=\"https:\/\/www.ibm.com\/topics\/insider-threats\" target=\"_blank\" rel=\"noopener\">strategies<\/a> managed service providers (MSPs) and the organizations they serve can utilize to detect, contain, and prevent these insidious insider threats before it&#8217;s too late.<\/p>\n<ul>\n<li><strong>Conduct security awareness training (SAT):<\/strong> Conduct security awareness training to teach employees best security practices, such as password hygiene, taking care with sensitive data, and recognizing phishing scams. This can help reduce the threat of breaches due to ignorance or negligence. If they can\u2019t provide this training on their own, conduct it for them. Learn how to implement proper security awareness training for clients with <a href=\"https:\/\/www.pax8.com\/en-us\/academy\/\" target=\"_blank\" rel=\"noopener\">Pax8 Academy<\/a> or <a href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/cybersecurity\/#form\" target=\"_blank\" rel=\"noopener\">connect with your channel account manager<\/a> to discuss which vendors provide SAT like IRONSCALES and Breach Secure Now.<\/li>\n<li><strong>Implement identity and access management (IAM):<\/strong> This concept ensures users and devices have access to the right data at the right time. To thwart bad actors from inside the organization, limit the permissions of any departing employees immediately.<\/li>\n<li><strong>Utilize user behavior analytics:<\/strong> Apply advanced data analytics and artificial intelligence (AI) to discover baseline user behaviors \u2014 so that it\u2019s easier to detect if anything fishy is going on.<\/li>\n<li><strong>Use offensive security:<\/strong> Don\u2019t be afraid to be offensive when it comes to your security practices. Offensive security, or OffSec, involves using \u201cethical hacking\u201d to detect and fix any IT system flaws, security risks, and vulnerabilities. Running phishing simulations or red teaming can help strengthen insider threat programs. It\u2019s like having a double-double agent!<\/li>\n<\/ul>\n<h2>How we can help<\/h2>\n<p>Pax8 is like your cybersecurity 911 for insider threats. From <a href=\"https:\/\/academy.pax8.com\/learn\/courses\/2209\/security-201-cyber-malice-security-threats\" target=\"_blank\" rel=\"noopener\">Academy courses on the nitty gritty of cybersecurity<\/a> to solutions to white-labeled resources to help guide conversations with your clients, we\u2019ve got you covered. Start exploring the Pax8 Marketplace and our resources to see how to protect yourself and your clients from insider threats.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/en-us\/marketplace\/cybersecurity\/#insurance\" target=\"_blank\" rel=\"noopener\">Get more resources<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stay one step ahead of the difficult cybersecurity issues of insider threats with this guide. <\/p>\n","protected":false},"author":171,"featured_media":4705,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4,85,5],"tags":[],"class_list":["post-4702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp","category-reduce-risk","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to avoid insider threats | Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with this guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to avoid insider threats\" \/>\n<meta property=\"og:description\" content=\"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with our guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T09:08:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T16:55:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pmysliviec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"How to avoid insider threats\" \/>\n<meta name=\"twitter:description\" content=\"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with our guide.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pmysliviec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/\"},\"author\":{\"name\":\"pmysliviec\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\"},\"headline\":\"The call is coming from inside the house: how to avoid insider threats\",\"datePublished\":\"2024-10-07T09:08:51+00:00\",\"dateModified\":\"2024-10-08T16:55:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/\"},\"wordCount\":986,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/09\\\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\",\"articleSection\":[\"MSPs\",\"Reduce risk\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/\",\"name\":\"How to avoid insider threats | Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/09\\\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\",\"datePublished\":\"2024-10-07T09:08:51+00:00\",\"dateModified\":\"2024-10-08T16:55:25+00:00\",\"description\":\"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with this guide.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/09\\\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2024\\\/09\\\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg\",\"width\":1200,\"height\":630,\"caption\":\"cybersecurity awareness month how to avoid insider threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/how-to-avoid-insider-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The call is coming from inside the house: how to avoid insider threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4796ce0b7f3895c287f8d742d950b4a8\",\"name\":\"pmysliviec\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/pmysliviec\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to avoid insider threats | Pax8 Blog","description":"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with this guide.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/","og_locale":"en_US","og_type":"article","og_title":"How to avoid insider threats","og_description":"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with our guide.","og_url":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/","og_site_name":"Pax8 Blog","article_published_time":"2024-10-07T09:08:51+00:00","article_modified_time":"2024-10-08T16:55:25+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","type":"image\/jpeg"}],"author":"pmysliviec","twitter_card":"summary_large_image","twitter_title":"How to avoid insider threats","twitter_description":"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with our guide.","twitter_image":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","twitter_misc":{"Written by":"pmysliviec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/"},"author":{"name":"pmysliviec","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8"},"headline":"The call is coming from inside the house: how to avoid insider threats","datePublished":"2024-10-07T09:08:51+00:00","dateModified":"2024-10-08T16:55:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/"},"wordCount":986,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","articleSection":["MSPs","Reduce risk","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/","url":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/","name":"How to avoid insider threats | Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","datePublished":"2024-10-07T09:08:51+00:00","dateModified":"2024-10-08T16:55:25+00:00","description":"Stay one step ahead of insider threats, one of the most difficult cybersecurity issues around, with this guide.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2024\/09\/cybersecurity-awareness-month-how-to-avoid-insider-threats.jpg","width":1200,"height":630,"caption":"cybersecurity awareness month how to avoid insider threats"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/how-to-avoid-insider-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The call is coming from inside the house: how to avoid insider threats"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4796ce0b7f3895c287f8d742d950b4a8","name":"pmysliviec","url":"https:\/\/www.pax8.com\/blog\/author\/pmysliviec\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=4702"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/4702\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/4705"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=4702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=4702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=4702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}