{"id":100085,"date":"2024-12-09T11:47:50","date_gmt":"2024-12-09T03:47:50","guid":{"rendered":"https:\/\/version-2.com\/?p=100085"},"modified":"2024-12-12T16:02:24","modified_gmt":"2024-12-12T08:02:24","slug":"tackling-insider-attacks","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/12\/tackling-insider-attacks\/","title":{"rendered":"Tackling Insider Attacks"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"100085\" class=\"elementor elementor-100085\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25f39c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25f39c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05f590f\" data-id=\"05f590f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6692190 elementor-widget elementor-widget-text-editor\" data-id=\"6692190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It\u2019s hard to accept, but the facts don\u2019t lie: organizations must face the reality that \u201cthe call may be coming from inside the house.\u201d In other words, you have a bad actor on your team.\u00a0<\/p><p>Whether it\u2019s malicious intent or simply human error, someone may be derailing your business security from the inside.\u00a0<\/p><h2><strong>What Is an Insider Threat?<\/strong><\/h2><p>An insider threat is a security risk posed by individuals within an organization who have access to its data, systems, or premises. These threats can originate from current or former employees, contractors, business partners, or anyone granted access to the organization\u2019s infrastructure.\u00a0<\/p><p>They can be malicious, with the intent to cause harm, or unintentional, stemming from negligence or mishandling (such as falling victim to phishing attacks).<\/p><figure class=\"w-richtext-align-fullwidth w-richtext-figure-type-image\"><div><img decoding=\"async\" src=\"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\" alt=\"\" \/><\/div><\/figure><h2><strong>PAM vs. Your Insider Threats<\/strong><\/h2><p>Insider breaches can lead to severe financial losses and damage an organization\u2019s reputation.\u00a0<a href=\"https:\/\/senhasegura.com\/products\/privileged-access-management\"><strong>Privileged Access Management (PAM)<\/strong>\u00a0solutions<\/a>, like those offered here at senhasegura, are essential in reducing these threats.\u00a0<\/p><p>A key concept in PAM is the\u00a0<a href=\"https:\/\/senhasegura.com\/post\/principle-of-least-privilege\"><strong>Principle of the Least privilege (PoLP)<\/strong><\/a>, which limits access rights to only what is necessary for users to perform their duties, reducing the risk of misuse or exploitation. By\u00a0<a href=\"https:\/\/senhasegura.com\/post\/privileged-access-management-pam-a-complete-guide\">controlling and monitoring privileged access<\/a>, senhasegura\u2019s PAM solution minimizes the attack surface and ensures that potentially dangerous actions are detected and addressed.<\/p><p>senhasegura\u2019s PAM solution provides continuous\u00a0<a href=\"https:\/\/senhasegura.com\/solutions\/insider-threat\"><strong>insider threat detection<\/strong><\/a>\u00a0by monitoring and auditing all activities performed through privileged accounts. Its capabilities include detecting and addressing potentially harmful actions before they escalate, reducing the attack surface.<\/p><p>This allows organizations to identify\u00a0<strong>insider threat indicators<\/strong>\u00a0such as:<\/p><ul role=\"list\"><li><strong>Unusual Access Patterns<\/strong>: Attempts to access systems outside of normal working hours or from unexpected locations.<\/li><li><strong>Data Transfers<\/strong>: Unauthorized or unusually large transfers, uploads, or downloads of data.<\/li><li><strong>Behavioral Deviations<\/strong>: Actions that significantly deviate from a user\u2019s established behavior patterns.<\/li><\/ul><h2><strong>The Power of Session Management<\/strong><\/h2><p>PAM solutions also offer\u00a0<a href=\"https:\/\/senhasegura.com\/services\/session-management\">session management capabilities<\/a>, including monitoring and recording user activities during privileged sessions. If a user is detected possibly engaging in malicious or unauthorized actions, the PAM system will detect and flag these activities for immediate review.\u00a0<\/p><p>This level of monitoring ensures that even subtly suspicious behaviors are recorded and available for analysis.<\/p><p>The\u00a0<a href=\"https:\/\/www.whistleblowers.org\/news\/the-case-of-edward-snowden\/\">case of Edward Snowden<\/a>\u00a0is an infamous<strong>\u00a0insider threat example<\/strong>. Snowden, an NSA contractor, used his authorized access to leak sensitive data. Although he had legitimate access, his actions in exfiltrating and disseminating data were unusual and could have been flagged by proper PAM monitoring.<\/p><p><strong>Excessive or unchecked privileged access<\/strong>\u00a0can be easily exploited by bad actors, resulting in data breaches and unauthorized actions. Misuse and exposure of sensitive data can lead to catastrophic outcomes, especially if an attacker gains access through compromised credentials.<\/p><p>To combat these risks, PAM solutions employ all sorts of measures, including the rotation of credentials and restriction of access, ensuring that even if a credential is compromised, it is of limited value to attackers.<\/p><h2><strong>People First: Insider Threat Training<\/strong><\/h2><p>While technical solutions are essential, providing\u00a0<strong>insider threat training<\/strong>\u00a0to your team is equally important. Organizations must educate employees on security best practices and establish a culture of vigilance.\u00a0<\/p><p>Human errors, whether due to carelessness or lack of awareness, can (and will) be exploited by attackers. Combining advanced PAM technology with regular training is vital for effective\u00a0<strong>insider threat prevention<\/strong>.<\/p><h2><strong>Trust No One<\/strong><\/h2><p>Organizations should adopt a\u00a0<a href=\"https:\/\/senhasegura.com\/post\/what-is-zero-trust\"><strong>Zero Trust<\/strong>\u00a0approach<\/a>, which assumes that no one \u2013 regardless of rank or role \u2013 can be trusted by default. This framework recognizes that even well-meaning employees can make mistakes that lead to security incidents.\u00a0<\/p><p>This matters even more for upper management, whose accounts are highly targeted because of their elevated privileges. Effective insider threat management involves not only reactive measures but also proactive steps, such as analyzing user behavior, evaluating risk, and assessing access controls.\u00a0<\/p><p>These actions anticipate and prevent potential threats before they escalate.<\/p><h2><strong>Remote Work and Hybrid Environments<\/strong><\/h2><p>The ship has sailed. Days of closed systems and dedicated internal servers are gone. The rise of remote and hybrid work has created new challenges for\u00a0<a href=\"https:\/\/senhasegura.com\/post\/the-pillars-of-cybersecurity\"><strong>insider threats in cyber security<\/strong><\/a>.\u00a0<\/p><p>Without traditional physical boundaries, it\u2019s harder to monitor user activities\u2014further compounded by high turnover and increased third-party access. PAM solutions offer centralized control and monitoring, ensuring secure management of both internal and external users \u2013 no matter where they work.<\/p><h2><strong>Broad Capabilities for Insider Threat Prevention<\/strong><\/h2><p>senhasegura offers a centralized platform to manage privileged accounts, enforce the principle of least privilege, monitor user activities, and provide\u00a0<strong>insider threat detection<\/strong>\u00a0through\u00a0<a href=\"https:\/\/senhasegura.com\/products\/domum-remote-access\">real-time alerts and session recordings<\/a>.\u00a0<\/p><p>These solutions include credential rotation, detailed auditing, and management of third-party access, all of which are critical in\u00a0<strong>managing risks and mitigating insider threats<\/strong>.\u00a0<\/p><p>By ensuring visibility, security, and compliance, senhasegura strengthens organizations against insider threats, reducing their impact and enhancing overall security posture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a3d4f6 elementor-widget elementor-widget-spacer\" data-id=\"6a3d4f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>It\u2019s hard to accept, but the facts don\u2019t lie: organizat [&hellip;]<\/p>","protected":false},"author":149011789,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,1273,61],"tags":[420,1272],"class_list":["post-100085","post","type-post","status-publish","format-standard","hentry","category-segura","category-1273","category-press-release","tag-segura","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tackling Insider Attacks - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/post\/what-is-soc-2\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling Insider Attacks - Version 2\" \/>\n<meta property=\"og:description\" content=\"It\u2019s hard to accept, but the facts don\u2019t lie: organizat [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/post\/what-is-soc-2\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-09T03:47:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-12T08:02:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\" \/>\n<meta name=\"author\" content=\"v2ivan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"v2ivan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/tackling-insider-attacks\\\/\"},\"author\":{\"name\":\"v2ivan\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/00fa1eda686ce691a7b99cd215e79402\"},\"headline\":\"Tackling Insider Attacks\",\"datePublished\":\"2024-12-09T03:47:50+00:00\",\"dateModified\":\"2024-12-12T08:02:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/tackling-insider-attacks\\\/\"},\"wordCount\":809,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6573253b94d565cee31a2183\\\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\",\"keywords\":[\"Segura\",\"2024\"],\"articleSection\":[\"Segura\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/12\\\/tackling-insider-attacks\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2\",\"name\":\"Tackling Insider Attacks - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6573253b94d565cee31a2183\\\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\",\"datePublished\":\"2024-12-09T03:47:50+00:00\",\"dateModified\":\"2024-12-12T08:02:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#primaryimage\",\"url\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6573253b94d565cee31a2183\\\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\",\"contentUrl\":\"https:\\\/\\\/cdn.prod.website-files.com\\\/6573253b94d565cee31a2183\\\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/what-is-soc-2#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tackling Insider Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/00fa1eda686ce691a7b99cd215e79402\",\"name\":\"v2ivan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g\",\"caption\":\"v2ivan\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/v2ivan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling Insider Attacks - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/post\/what-is-soc-2","og_locale":"en_US","og_type":"article","og_title":"Tackling Insider Attacks - Version 2","og_description":"It\u2019s hard to accept, but the facts don\u2019t lie: organizat [&hellip;]","og_url":"https:\/\/senhasegura.com\/post\/what-is-soc-2","og_site_name":"Version 2","article_published_time":"2024-12-09T03:47:50+00:00","article_modified_time":"2024-12-12T08:02:24+00:00","og_image":[{"url":"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif","type":"","width":"","height":""}],"author":"v2ivan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"v2ivan","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/12\/tackling-insider-attacks\/"},"author":{"name":"v2ivan","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/00fa1eda686ce691a7b99cd215e79402"},"headline":"Tackling Insider Attacks","datePublished":"2024-12-09T03:47:50+00:00","dateModified":"2024-12-12T08:02:24+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/12\/tackling-insider-attacks\/"},"wordCount":809,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif","keywords":["Segura","2024"],"articleSection":["Segura","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/12\/tackling-insider-attacks\/","url":"https:\/\/senhasegura.com\/post\/what-is-soc-2","name":"Tackling Insider Attacks - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#primaryimage"},"thumbnailUrl":"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif","datePublished":"2024-12-09T03:47:50+00:00","dateModified":"2024-12-12T08:02:24+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/post\/what-is-soc-2"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#primaryimage","url":"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif","contentUrl":"https:\/\/cdn.prod.website-files.com\/6573253b94d565cee31a2183\/673516f2040f3ac005c37da9_673516b1c27ce84a2b58daa5_6732609c0bfc9f9240d629fb_identity-security-pam-demonstration_banner.avif"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/post\/what-is-soc-2#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Tackling Insider Attacks"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/00fa1eda686ce691a7b99cd215e79402","name":"v2ivan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dab017e18fdc70d80914730430988e7176d058d5d35cc04b2a570166a2fdcbb2?s=96&d=identicon&r=g","caption":"v2ivan"},"url":"https:\/\/version-2.com\/en\/author\/v2ivan\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-q2h","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011789"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=100085"}],"version-history":[{"count":7,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100085\/revisions"}],"predecessor-version":[{"id":100092,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/100085\/revisions\/100092"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=100085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=100085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=100085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}