{"id":880,"date":"2023-06-09T20:01:08","date_gmt":"2023-06-09T20:01:08","guid":{"rendered":"https:\/\/boydtechsolutions.com\/wordpress\/?p=880"},"modified":"2023-06-09T20:01:08","modified_gmt":"2023-06-09T20:01:08","slug":"insider-threats-are-getting-more-dangerous","status":"publish","type":"post","link":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/","title":{"rendered":"Insider Threats are getting more dangerous"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_image src=&#8221;https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v1.png&#8221; title_text=&#8221;TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection.<\/p>\n<p>Because insiders have authorized system access, they bypass certain security defenses. Such as those designed to keep intruders out. Since a logged-in user isn\u2019t seen as an intruder, those security protections aren\u2019t triggered.<\/p>\n<p>There are three <span><a href=\"https:\/\/www.proofpoint.com\/us\/blog\/insider-threat-management\/insider-threats-are-still-rise-2022-ponemon-report\">troubling statistics<\/a><\/span> from a recent report by Ponemon Institute They illustrate the importance of addressing this threat. Insider attacks are getting worse, taking longer to detect and becoming more extensive.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v2.png&#8221; title_text=&#8221;TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v2&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>The report found that over the last two years:<\/p>\n<ul>\n<li>Insider attacks have increased by 44%<\/li>\n<li>It takes organizations 85 days to contain an insider threat, compared to 77 days in 2020.<\/li>\n<li>The average cost of addressing insider threats has risen by 34%<\/li>\n<\/ul>\n<p>It\u2019s important for companies to understand what makes up an insider threat. That\u2019s the first step towards mitigation.<\/p>\n<h3><span>4 Types of Insider Threats<\/span><\/h3>\n<p>One reason that insider threats can be hard to detect is that there is not just one kind. Employees, vendors, and hackers can all perpetrate insider security breaches. To further complicate detection, some may be malicious and others accidental.<\/p>\n<p>Here are the four main types of insider threats faced by company networks.<\/p>\n<h3><span>Malicious\/Disgruntled Employee<\/span><\/h3>\n<p>A sales employee that is leaving the company may decide to take all their contacts with them. This is a malicious theft of company data.<\/p>\n<p>Another example of this type of insider attack is a disgruntled employee. They may be upset with their manager who just fired them and decide to do the business harm. They could plant ransomware or make a deal with a hacker to give over their login credentials for cash.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v3.png&#8221; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; title_text=&#8221;TTT_Blog-Post-Social-Media-Image-Insider-Threats-Are-Getting-More-Dangerous-v3&#8243; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;]<\/p>\n<h3><span>Careless\/Negligent Employee<\/span><\/h3>\n<p>Some insider threats are due to lazy or untrained employees. They don\u2019t mean to cause a data breach. But may accidentally share classified data on a non secure platform. Or they may use a friend\u2019s computer to access their business apps. Being completely unaware of the security consequences.<\/p>\n<h3><span>3rd Party with Access to Your Systems<\/span><\/h3>\n<p>Outsiders with access to your network are also a very real concern. Contractors, freelancers, and vendors can all constitute an insider breach risk.<\/p>\n<p>You need to ensure that these third parties are fully reviewed. Do this before you give them system access. You should also allow your IT partner to review them for any data security concerns.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":881,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[12,21,18],"tags":[],"class_list":["post-880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-at-boyd-tech","category-business-continuity","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Insider Threats are getting more dangerous - Boyd Tech Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Insider Threats are getting more dangerous - Boyd Tech Solutions\" \/>\n<meta property=\"og:description\" content=\"One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\" \/>\n<meta property=\"og:site_name\" content=\"Boyd Tech Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BoydTechSolutions\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T20:01:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1590\" \/>\n\t<meta property=\"og:image:height\" content=\"1061\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@BoydTechSol\" \/>\n<meta name=\"twitter:site\" content=\"@BoydTechSol\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/person\/41617571dc9e50875af91d8380db4254\"},\"headline\":\"Insider Threats are getting more dangerous\",\"datePublished\":\"2023-06-09T20:01:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\"},\"wordCount\":615,\"publisher\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg\",\"articleSection\":[\"At Boyd Tech\",\"Business Continuity\",\"Cybersecurity\"],\"inLanguage\":\"en\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\",\"url\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\",\"name\":\"Insider Threats are getting more dangerous - Boyd Tech Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg\",\"datePublished\":\"2023-06-09T20:01:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage\",\"url\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg\",\"contentUrl\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg\",\"width\":1590,\"height\":1061},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/boydtechsolutions.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insider Threats are getting more dangerous\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#website\",\"url\":\"https:\/\/boydtechsolutions.com\/wordpress\/\",\"name\":\"Boyd Tech Solutions\",\"description\":\"Vision. Tenacity, Fearless.\",\"publisher\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/boydtechsolutions.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#organization\",\"name\":\"Boyd Tech Solutions\",\"url\":\"https:\/\/boydtechsolutions.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2019\/12\/BTS_header_bbg__trans_100x308px.png\",\"contentUrl\":\"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2019\/12\/BTS_header_bbg__trans_100x308px.png\",\"width\":308,\"height\":100,\"caption\":\"Boyd Tech Solutions\"},\"image\":{\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/BoydTechSolutions\",\"https:\/\/x.com\/BoydTechSol\",\"https:\/\/www.linkedin.com\/company\/66759750\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/person\/41617571dc9e50875af91d8380db4254\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/BoydTechSolutions.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Insider Threats are getting more dangerous - Boyd Tech Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/","og_locale":"en_US","og_type":"article","og_title":"Insider Threats are getting more dangerous - Boyd Tech Solutions","og_description":"One of the most difficult types of attacks to detect are those performed by insiders. An \u201cinsider\u201d would be anyone that has legitimate access to your company network and data. This would be via a login or other authorized connection. Because insiders have authorized system access, they bypass certain security defenses. Such as those designed [&hellip;]","og_url":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/","og_site_name":"Boyd Tech Solutions","article_publisher":"https:\/\/www.facebook.com\/BoydTechSolutions","article_published_time":"2023-06-09T20:01:08+00:00","og_image":[{"width":1590,"height":1061,"url":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@BoydTechSol","twitter_site":"@BoydTechSol","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#article","isPartOf":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/"},"author":{"name":"admin","@id":"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/person\/41617571dc9e50875af91d8380db4254"},"headline":"Insider Threats are getting more dangerous","datePublished":"2023-06-09T20:01:08+00:00","mainEntityOfPage":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/"},"wordCount":615,"publisher":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","articleSection":["At Boyd Tech","Business Continuity","Cybersecurity"],"inLanguage":"en"},{"@type":"WebPage","@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/","url":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/","name":"Insider Threats are getting more dangerous - Boyd Tech Solutions","isPartOf":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage"},"image":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage"},"thumbnailUrl":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","datePublished":"2023-06-09T20:01:08+00:00","breadcrumb":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#primaryimage","url":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","contentUrl":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","width":1590,"height":1061},{"@type":"BreadcrumbList","@id":"https:\/\/boydtechsolutions.com\/wordpress\/blog\/2023\/06\/09\/insider-threats-are-getting-more-dangerous\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/boydtechsolutions.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Insider Threats are getting more dangerous"}]},{"@type":"WebSite","@id":"https:\/\/boydtechsolutions.com\/wordpress\/#website","url":"https:\/\/boydtechsolutions.com\/wordpress\/","name":"Boyd Tech Solutions","description":"Vision. Tenacity, Fearless.","publisher":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/boydtechsolutions.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/boydtechsolutions.com\/wordpress\/#organization","name":"Boyd Tech Solutions","url":"https:\/\/boydtechsolutions.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2019\/12\/BTS_header_bbg__trans_100x308px.png","contentUrl":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2019\/12\/BTS_header_bbg__trans_100x308px.png","width":308,"height":100,"caption":"Boyd Tech Solutions"},"image":{"@id":"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BoydTechSolutions","https:\/\/x.com\/BoydTechSol","https:\/\/www.linkedin.com\/company\/66759750"]},{"@type":"Person","@id":"https:\/\/boydtechsolutions.com\/wordpress\/#\/schema\/person\/41617571dc9e50875af91d8380db4254","name":"admin","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f623ae1401df8f4622508980bf98725b608ac1e85787dd94572a67b48851e7de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/BoydTechSolutions.com"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/boydtechsolutions.com\/wordpress\/wp-content\/uploads\/2023\/06\/TTT_2022-11-Blog-Insider-Threats-Are-Getting-More-Dangerous_Featured_resize.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=880"}],"version-history":[{"count":4,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/880\/revisions"}],"predecessor-version":[{"id":889,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/880\/revisions\/889"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/media\/881"}],"wp:attachment":[{"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/boydtechsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}