{"id":1115,"date":"2017-01-28T17:20:28","date_gmt":"2017-01-28T17:20:28","guid":{"rendered":"http:\/\/54.201.249.27\/?p=1115"},"modified":"2017-01-28T17:20:28","modified_gmt":"2017-01-28T17:20:28","slug":"insiders-vs-outsiders-whats-greater-cybersecurity-threat-infographic","status":"publish","type":"post","link":"https:\/\/blackopspartners.com\/insiders-vs-outsiders-whats-greater-cybersecurity-threat-infographic\/","title":{"rendered":"Insiders vs. Outsiders: What’s the Greater Cybersecurity Threat? (Infographic)"},"content":{"rendered":"

Insiders vs. Outsiders: What’s the Greater Cybersecurity Threat? (Infographic).<\/h1>\n

If you follow the news chances are you’ve read or heard about a myriad of cybersecurity threats recently. Whether\u00a0state-sponsored attackers targeting government agencies around the world<\/a>, the rash of\u00a0massive DDoS attacks<\/a>\u00a0in late 2016, the\u00a0arrest of an ex-Expedia IT employee involved in an insider trading scheme<\/a>, or recent\u00a0lawsuits alleging competition-sponsored theft of intellectual property<\/a>, it’s clear that the threats facing sensitive data in 2017 are varied and numerous.<\/p>\n

Defending against such a diverse threat landscape can seem like a daunting task, but by understanding the motives, targets, and methods of various threat actors, it can be made significantly easier. Check out our infographic below to learn more about various insider and outsider threat types and get tips for protecting sensitive data against both.<\/p>\n

 <\/p>\n

\"Insider<\/a><\/p>\n

Infographic by Digital Guardian<\/a>.<\/em><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

If you follow the news chances are you’ve read or heard about a myriad of cybersecurity threats recently. Whether state-sponsored attackers targeting government agencies around the world, the rash of massive DDoS attacks in late 2016, the arrest of an ex-Expedia IT employee involved in an insider trading scheme, or recent lawsuits alleging competition-sponsored theft of intellectual property, it’s clear that the threats facing sensitive data in 2017 are varied and numerous.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[8,10],"tags":[],"acf":[],"_links":{"self":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1115"}],"collection":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/comments?post=1115"}],"version-history":[{"count":0,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/posts\/1115\/revisions"}],"wp:attachment":[{"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/media?parent=1115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/categories?post=1115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blackopspartners.com\/wp-json\/wp\/v2\/tags?post=1115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}