{"id":218,"date":"2020-03-27T06:56:38","date_gmt":"2020-03-27T06:56:38","guid":{"rendered":"https:\/\/www.itminister.co.uk\/blog\/?p=218"},"modified":"2020-03-27T06:56:38","modified_gmt":"2020-03-27T06:56:38","slug":"indicators-of-compromise","status":"publish","type":"post","link":"https:\/\/www.itminister.co.uk\/blog\/indicators-of-compromise\/","title":{"rendered":"Indicators of Compromise"},"content":{"rendered":"\n<p>As the threat landscape continues to evolve, organizations are under \nmore pressure than ever to manage their security vulnerabilities. Known \nas Indicators of Compromise, or IoCs, these digital footprints are \nevidence of potential intrusions on a network which allow infosec \nprofessionals to detect malicious activity.&nbsp;<\/p>\n\n\n\n<p>Common indicators of compromise can include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unusual network traffic patterns going in and out of the network<\/li><li>Log-ins from a single account but from different global IPs, in a short amount of time<\/li><li>Suspicious activity in privileged user accounts<\/li><li>Abnormal geographical activities, such as access patterns and  log-ins in a country with which your organization normally does not  conduct business<\/li><li>DNS request anomalies<\/li><li>Repeated login failures from both non-existing and existing user accounts<\/li><li>Sizable spikes in database read volume<\/li><\/ul>\n\n\n\n<p><a href=\"https:\/\/www.domaintools.com\/resources\/blog\/dont-compromise-when-it-comes-to-threat-intel\">Read More<\/a><\/p>\n\n\n\n<p>iTM covers all aspects of cybersecurity from Home cyber security managed     solutions to automated, manage threat intelligence, forensic  investigations and cyber security training. Our objective is to support  organisations and consumers at every step of their cyber maturity  journey.<a href=\"https:\/\/www.itminister.co.uk\/contact.html\"> Contact Us<\/a> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the threat landscape continues to evolve, organizations are under more pressure than ever to manage their security vulnerabilities. Known as Indicators of Compromise, or IoCs, these digital footprints are evidence of potential intrusions on a network which allow infosec professionals to detect malicious activity.&nbsp; Common indicators of compromise can include: Unusual network traffic patterns &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/www.itminister.co.uk\/blog\/indicators-of-compromise\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Indicators of Compromise&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","beyondwords_generate_audio":"","beyondwords_integration_method":"","beyondwords_project_id":"","beyondwords_content_id":"","beyondwords_preview_token":"","beyondwords_player_content":"","beyondwords_player_style":"","beyondwords_language_code":"","beyondwords_language_id":"","beyondwords_title_voice_id":"","beyondwords_body_voice_id":"","beyondwords_summary_voice_id":"","beyondwords_error_message":"","beyondwords_disabled":"","beyondwords_delete_content":"","beyondwords_podcast_id":"","beyondwords_hash":"","publish_post_to_speechkit":"","speechkit_hash":"","speechkit_generate_audio":"","speechkit_project_id":"","speechkit_podcast_id":"","speechkit_error_message":"","speechkit_disabled":"","speechkit_access_key":"","speechkit_error":"","speechkit_info":"","speechkit_response":"","speechkit_retries":"","speechkit_status":"","speechkit_updated_at":"","_speechkit_link":"","_speechkit_text":""},"categories":[18],"tags":[],"class_list":["post-218","post","type-post","status-publish","format-standard","hentry","category-cyber-security-best-practice"],"_links":{"self":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/218","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":1,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/218\/revisions"}],"predecessor-version":[{"id":219,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/posts\/218\/revisions\/219"}],"wp:attachment":[{"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=218"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=218"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itminister.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}