{"id":1327,"date":"2024-04-16T06:15:41","date_gmt":"2024-04-16T12:15:41","guid":{"rendered":"https:\/\/grownuptech.com\/?p=1310"},"modified":"2024-08-12T18:41:00","modified_gmt":"2024-08-12T18:41:00","slug":"insider-threats-could-that-be-you","status":"publish","type":"post","link":"https:\/\/oakwoodexperience.com\/staging\/2633\/insider-threats-could-that-be-you\/","title":{"rendered":"Insider Threats: Could That Be You?"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img data-recalc-dims=\"1\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg?w=1290&#038;ssl=1\" alt=\"\" class=\"wp-image-1311\" style=\"width:201px;height:auto\"\/><\/figure>\n<\/div>\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-69c209be9c0736b315ba6de459cddfd4\"><strong>I work in technology, and my degree is in Cybersecurity, so I think about how we use tech a little differently than most of my friends. We, the technology and security professionals who work in the places you work and shop and visit, put a lot of effort and a lot of resources into keeping those places safe for their purposes. You must understand, however, that all of our technical efforts only go so far. They stop at the user. There are things that we simply cannot do, and those things involve the actions that you need to be aware of needing to do or not do.<\/strong><strong><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-49660b1c5d9ad10ce1d41344efdfe8ee\"><strong>What is an Insider Threat?<\/strong><strong><\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-073098bd97bc0f2c2fb5c52b39ee1150\"><strong>There are people who act as what we call Insider Threats. You\u2019ve heard of them, people who work in a place and use their position to do horrible things like steal money, sell information to foreign powers, or exact revenge. But there is another type of Insider Threat. The non-malicious Insider Threat is someone who has legitimate access to resources and, in general, uses that access appropriately, but, at some point, makes a mistake, or an error in judgment, or allows a lapse in security. Insiders are employees, yes, but they can also be contractors, vendors, and anyone with inside access to the organization\u2019s systems and data. They don\u2019t intend to cause problems, and perhaps no problems arise, but the threat exists. It\u2019s important to understand that your lack of malicious intent has a limited capacity to mitigate the damage done by the existence of the threat. <\/strong><strong><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-558f3b9d111f88c228c67aeb86289622\"><strong>The Dual Nature of Insider Threats<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-45f017d51756e03802868709100d8464\"><strong>I\u2019m going to say this again, because it\u2019s very important: There are two types of insider threats: malicious (intentional) and accidental (unintentional). The malicious threat actor may be motivated by money, ideology, ego, or he may have been compromised in some way. That is, someone may have discovered something about him that he may not want disclosed, and they may be blackmailing him. The unintentional threat may be caused by a lack of awareness of how actions affect the security posture of the organization, or he may not have received adequate training on proper security procedures.<\/strong><strong><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-3876d03637b9af1d70638cc25e41b28e\"><strong>Understanding Unintentional Insider Threats<\/strong><strong><\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-bbceabaf9a8713079587ce3e9e5a87af\"><strong>Unintentional insider threats can occur when employees make mistakes or overlook important security settings on their devices or within the organization\u2019s systems. That\u2019s why some settings aren\u2019t available if your organization\u2019s IT team is managing them and you can\u2019t change them the way you may want to. Misusing credentials is another way employees can become threats. If you share your login information with someone else, or if you use a weak password or make it something someone can easily guess, you can be letting a malicious threat into the organization. You may also unintentionally disclose sensitive information in conversations with others, or by not paying attention when you\u2019re using your computer and someone watches you access a system. Additionally, phishing scams are a very common tactic to trick you into revealing sensitive information, or getting you to give someone access to systems. Make no mistake, the people who send you the emails and text messages to get you to click on something are very good at what they do, so it\u2019s not a case of playing on a lack of intelligence. They\u2019ve studied the psychology of how to get you to help them, and they count on you wanting to be helpful or too busy to notice something that may give them away.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-4822a64f44f878b453aeffca91a8569c\"><strong>As an example of a configuration error creating an insider threat situation, do you remember the Equifax breach? In 2017, a misconfigured Amazon Web Services (AWS) server by a third-party contractor exposed the personal data and tax numbers of approximately 143 million consumers in the Equifax data breach. The misconfiguration was due to the failure of implementing proper security measures, which allowed hackers to gain unauthorized access to sensitive data.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-a6a7da06748099c716a68aea6c606335\"><strong>Phishing is still the most common method of getting into an organization. In 2016, the Democratic National Committee (DNC) fell victim to a phishing attack that led to the theft and subsequent leak of sensitive internal emails. The attackers sent spear-phishing emails to DNC employees, tricking them into revealing their credentials and providing access to the attackers who later leaked the emails, potentially influencing the 2016 US presidential election. (Definition: spear-phishing \u2013 phishing that is targeted to certain individuals.)<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-d1b30097d86c25495fb5a9aa0cda1a90\"><strong>What\u2019s t<\/strong><strong>he Impact of Unintentional Insider Threats<\/strong><strong>?<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f1f7f1c07b3b9476dc70618a730ac1df\"><strong>The fact that you don\u2019t mean for anything bad to happen doesn\u2019t mean nothing bad will happen. While the bulk of defense will fall on the IT department, a simple user lapse can cause a data breach, and the outcome of that can cause loss of trust, as in the Equifax breach. Your organization can also experience serious financial repercussions.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-f3ccbb9baa0737551c23ad4e83449e76\"><strong>Your company\u2019s IT department will take a defensive stance to mitigate the risk of malicious insiders, but some of the things that department does, inconvenient as they probably are, that will help keep you from becoming an insider threat:<\/strong><\/p>\n\n\n\n<ul class=\"has-black-color has-text-color has-link-color wp-block-list wp-elements-ce11732bff976426dbe2283eae8fa83f\">\n<li><strong>Education and training: the periodic security training you have to undergo is to remind you or instruct you of the role you play in preventing data loss or breaches<\/strong><\/li>\n\n\n\n<li><strong>Robust security configurations: the updates that come at the most inconvenient times, access controls, the configurations that you can\u2019t change<\/strong><\/li>\n\n\n\n<li><strong>Monitoring and detection: periodic scans of systems to ensure that your computer is getting updates and patches; notifications to security systems that a user has done something unacceptable or unusual (like logging into a system during off-hours, or trying to access a folder designated for specific personnel, like HR or Finance)<\/strong><\/li>\n<\/ul>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ea6bf757cc077b9f9d5e69830050cbed\"><strong>These measures also prevent malicious activity, and the fact that they\u2019re in place isn\u2019t an indication of a lack of trust, but more of an overall security plan.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading has-black-color has-text-color has-link-color wp-elements-13f6d922a80f1968c61f7808d915a165\"><strong>A Culture of Security<\/strong><\/h2>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-823ad4ca41374f61c0cbfec2248c4d06\"><strong>If your organization has put any of those measures into place, it\u2019s trying to create a culture of security, where the employee behavior \u2013 that is, the behavior of <em>all <\/em>&nbsp;of the employees \u2013 becomes secure by default. Each employee should expect to have to access the building securely; while holding the door for someone is a nice gesture, if the requirement to use an access badge or code is in place, that\u2019s what you should do, and that\u2019s what the person behind you should expect to do as well. It can be frustrating to have to deal with some of the security configurations (we have to comply with them, too, and we feel the same frustrations), but every security measure is a response to a recognized threat, and you shouldn\u2019t take any of it personally.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-814e90c0895b391fd1345762e3db6d38\"><strong>Take some time to think about your organization\u2019s security policies and procedures. You play an important part in keeping the company running securely. Maybe next time you get a notification about security training, you\u2019ll understand better why it\u2019s required, and when a new security measure is implemented, you\u2019ll realize that it\u2019s not just to make you mad.<\/strong><\/p>\n\n\n\n<p class=\"has-black-color has-text-color has-link-color wp-elements-ec27e730551ba7ba260930d52004caa0\"><strong>Drop a comment below if this helped you in any way.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unintentional insider threats often arise from simple oversights such as misconfigured settings or employees inadvertently sharing sensitive information. It&#8217;s crucial for organizations to implement regular security training and access controls to minimize these risks and protect against potential data breaches.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[8,10,9],"tags":[50,437,621,768,221,238],"class_list":["post-1327","post","type-post","status-publish","format-standard","hentry","category-recentrelevant","category-commentary-and-consideration","category-basics","tag-computer","tag-culture-of-security","tag-insider-threat","tag-password","tag-security","tag-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insider Threats: Could That Be You? - Oakwood Experience<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider Threats: Could That Be You? - Oakwood Experience\" \/>\n<meta property=\"og:description\" content=\"Unintentional insider threats often arise from simple oversights such as misconfigured settings or employees inadvertently sharing sensitive information. It&#039;s crucial for organizations to implement regular security training and access controls to minimize these risks and protect against potential data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/\" \/>\n<meta property=\"og:site_name\" content=\"Oakwood Experience\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/profile.php?id=61563885192881\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-16T12:15:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:41:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg\" \/>\n<meta name=\"author\" content=\"Nancy Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/x.com\/oakwood92297\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/\"},\"author\":{\"name\":\"Nancy Jones\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\"},\"headline\":\"Insider Threats: Could That Be You?\",\"datePublished\":\"2024-04-16T12:15:41+00:00\",\"dateModified\":\"2024-08-12T18:41:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/\"},\"wordCount\":1200,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Insider-Threat.jpg\",\"keywords\":[\"computer\",\"culture of security\",\"insider threat\",\"password\",\"security\",\"technology\"],\"articleSection\":[\"Recent and Relevant\",\"Tech Commentary and Consideration\",\"The Basics of How Things Work\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/\",\"name\":\"Insider Threats: Could That Be You? - Oakwood Experience\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Insider-Threat.jpg\",\"datePublished\":\"2024-04-16T12:15:41+00:00\",\"dateModified\":\"2024-08-12T18:41:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#primaryimage\",\"url\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Insider-Threat.jpg\",\"contentUrl\":\"https:\\\/\\\/grownuptech.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/Insider-Threat.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/insider-threats-could-that-be-you\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/oakwoodexperience.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insider Threats: Could That Be You?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#website\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"name\":\"Oakwood Experience\",\"description\":\"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.\",\"publisher\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/oakwoodexperience.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#organization\",\"name\":\"Oakwood Experience\",\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/Oakwood-Experience.png?fit=1000%2C885&ssl=1\",\"width\":1000,\"height\":885,\"caption\":\"Oakwood Experience\"},\"image\":{\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/oakwoodexperience.com\\\/#\\\/schema\\\/person\\\/55a8ed6b0b18ff93e63bbba903d4dae3\",\"name\":\"Nancy Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g\",\"caption\":\"Nancy Jones\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/profile.php?id=61563885192881\",\"https:\\\/\\\/www.instagram.com\\\/southernfriedyanqui\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/feed\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/x.com\\\/oakwood92297\",\"https:\\\/\\\/www.youtube.com\\\/@nancyjones6235\"],\"url\":\"https:\\\/\\\/oakwoodexperience.com\\\/staging\\\/2633\\\/author\\\/nancyjones36507\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insider Threats: Could That Be You? - Oakwood Experience","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/","og_locale":"en_US","og_type":"article","og_title":"Insider Threats: Could That Be You? - Oakwood Experience","og_description":"Unintentional insider threats often arise from simple oversights such as misconfigured settings or employees inadvertently sharing sensitive information. It's crucial for organizations to implement regular security training and access controls to minimize these risks and protect against potential data breaches.","og_url":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/","og_site_name":"Oakwood Experience","article_author":"https:\/\/www.facebook.com\/profile.php?id=61563885192881","article_published_time":"2024-04-16T12:15:41+00:00","article_modified_time":"2024-08-12T18:41:00+00:00","og_image":[{"url":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg","type":"","width":"","height":""}],"author":"Nancy Jones","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/x.com\/oakwood92297","twitter_misc":{"Written by":"Nancy Jones","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#article","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/"},"author":{"name":"Nancy Jones","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3"},"headline":"Insider Threats: Could That Be You?","datePublished":"2024-04-16T12:15:41+00:00","dateModified":"2024-08-12T18:41:00+00:00","mainEntityOfPage":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/"},"wordCount":1200,"commentCount":0,"publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"image":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#primaryimage"},"thumbnailUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg","keywords":["computer","culture of security","insider threat","password","security","technology"],"articleSection":["Recent and Relevant","Tech Commentary and Consideration","The Basics of How Things Work"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/","url":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/","name":"Insider Threats: Could That Be You? - Oakwood Experience","isPartOf":{"@id":"https:\/\/oakwoodexperience.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#primaryimage"},"image":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#primaryimage"},"thumbnailUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg","datePublished":"2024-04-16T12:15:41+00:00","dateModified":"2024-08-12T18:41:00+00:00","breadcrumb":{"@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#primaryimage","url":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg","contentUrl":"https:\/\/grownuptech.com\/wp-content\/uploads\/2024\/04\/Insider-Threat.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/oakwoodexperience.com\/insider-threats-could-that-be-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/oakwoodexperience.com\/"},{"@type":"ListItem","position":2,"name":"Insider Threats: Could That Be You?"}]},{"@type":"WebSite","@id":"https:\/\/oakwoodexperience.com\/#website","url":"https:\/\/oakwoodexperience.com\/","name":"Oakwood Experience","description":"Technology news, information, commentary, tutorials, and deep dives, and my photography journey.","publisher":{"@id":"https:\/\/oakwoodexperience.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/oakwoodexperience.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/oakwoodexperience.com\/#organization","name":"Oakwood Experience","url":"https:\/\/oakwoodexperience.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","contentUrl":"https:\/\/i0.wp.com\/oakwoodexperience.com\/staging\/2633\/wp-content\/uploads\/2024\/07\/Oakwood-Experience.png?fit=1000%2C885&ssl=1","width":1000,"height":885,"caption":"Oakwood Experience"},"image":{"@id":"https:\/\/oakwoodexperience.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/oakwoodexperience.com\/#\/schema\/person\/55a8ed6b0b18ff93e63bbba903d4dae3","name":"Nancy Jones","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b844525c51c8c622b37a68f8239add25f67d81fdee39b2f3d9c6e80dfde4e31a?s=96&d=mm&r=g","caption":"Nancy Jones"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61563885192881","https:\/\/www.instagram.com\/southernfriedyanqui\/","https:\/\/www.linkedin.com\/feed\/","https:\/\/x.com\/https:\/\/x.com\/oakwood92297","https:\/\/www.youtube.com\/@nancyjones6235"],"url":"https:\/\/oakwoodexperience.com\/staging\/2633\/author\/nancyjones36507\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1327","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/comments?post=1327"}],"version-history":[{"count":1,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1327\/revisions"}],"predecessor-version":[{"id":1575,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/posts\/1327\/revisions\/1575"}],"wp:attachment":[{"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/media?parent=1327"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/categories?post=1327"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oakwoodexperience.com\/staging\/2633\/wp-json\/wp\/v2\/tags?post=1327"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}