Indicators of Compromise

As the threat landscape continues to evolve, organizations are under more pressure than ever to manage their security vulnerabilities. Known as Indicators of Compromise, or IoCs, these digital footprints are evidence of potential intrusions on a network which allow infosec professionals to detect malicious activity. 

Common indicators of compromise can include:

  • Unusual network traffic patterns going in and out of the network
  • Log-ins from a single account but from different global IPs, in a short amount of time
  • Suspicious activity in privileged user accounts
  • Abnormal geographical activities, such as access patterns and log-ins in a country with which your organization normally does not conduct business
  • DNS request anomalies
  • Repeated login failures from both non-existing and existing user accounts
  • Sizable spikes in database read volume

Read More

iTM covers all aspects of cybersecurity from Home cyber security managed solutions to automated, manage threat intelligence, forensic investigations and cyber security training. Our objective is to support organisations and consumers at every step of their cyber maturity journey. Contact Us

Leave a Reply

Your email address will not be published. Required fields are marked *