{"id":3730,"date":"2020-07-23T07:30:42","date_gmt":"2020-07-23T12:30:42","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=3730"},"modified":"2020-07-29T15:16:16","modified_gmt":"2020-07-29T20:16:16","slug":"how-to-fight-insider-recruitment-tactics","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/","title":{"rendered":"How to Fight Insider Recruitment Tactics"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-3731\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-300x150.jpg\" alt=\"A man in a dark suit is shown from the neck down pointing to a row of blue icons that look like men wearing ties. He's pointing to one that's red and wearing a hat, symbolizing an insider threat to security.\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-300x150.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-1024x512.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-768x384.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-1536x768.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-2048x1024.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment-200x100.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Elon Musk. Barack Obama. Jeff Bezos. Kanye West. What do all of these people have in common? Hackers recently succeeded in gaining access to their Twitter accounts, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.npr.org\/2020\/07\/15\/891614274\/twitter-accounts-of-jeff-bezos-bill-gates-joe-biden-barack-obama-hit-by-hackers\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">NPR<\/a>. After taking over these high-profile accounts, among others, the malicious actors sent out tweets posing as these celebrities and politicians and claiming that they would double or otherwise multiply all Bitcoin payments sent to them within a 30 minute time period.<\/p>\n<p>In a\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/blog.twitter.com\/en_us\/topics\/company\/2020\/an-update-on-our-security-incident.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">blog post<\/a>, Twitter revealed that the hackers used social engineering strategies to get around<a class=\"external-link\" href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">\u00a0security safeguards<\/a>. &#8220;The attackers successfully manipulated a small number of employees and used their credentials to access Twitter\u2019s internal systems, including getting through our two-factor protections,&#8221; the post explains. &#8220;As of now, we know that they accessed tools only available to our internal support teams to target 130 Twitter accounts. For 45 of those accounts, the attackers were able to initiate a password reset, login to the account, and send Tweets.&#8221;<\/p>\n<p>It&#8217;s not yet clear whether the cybercriminals tricked Twitter employees or worked in cahoots with them, although\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.vice.com\/en_us\/article\/jgxd3d\/twitter-insider-access-panel-account-hacks-biden-uber-bezos\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Vice has reported<\/a>\u00a0that two anonymous sources who participated in the account takeovers and leaked screenshots reveal the hackers paid a member of Twitter&#8217;s internal staff to help with the scheme.<\/p>\n<p>If that&#8217;s true, this incident is an example of a larger trend in the world of cybersecurity called insider recruitment, according to\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.databreachtoday.com\/twitter-hijackers-used-well-honed-fraudster-playbook-a-14655?rf=2020-07-20_ENEWS_ACQ_DBT__Slot1_ART14655&amp;mkt_tok=eyJpIjoiTlRJek9ETmhPR0ZpWWpRMCIsInQiOiJvRVQ2aTNZa2ExWVNZK2pybVF0WkQ3ekVpcFkzNWZzSE5oRlI2cUl1OUk4c0d1RVNBcFk2eHV0YTFvMDh5R3BtWVZjeTRQVzljRFBKU21vZWhjNjc4SFM2c1wvTCswSzZFckdyMjVwMFZcL0xHVW9OWXpuXC90SWthQXlCVEJnZkF1bTZWakIxSTRJU0RvQytDVmluejQxbFE9PSJ9\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Data Breach Today<\/a>. In addition to proactively working to fend off threats that come from outside the company, CISOs and other executives must also stop hackers from turning their employees to the dark side with tactics like bribes and blackmail.<\/p>\n<h2>The Rise of Insider Recruitment<\/h2>\n<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/cybersecurity-incident-response-services-faq-why-preparing-for-a-potential-data-breach-matters-now-more-than-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security incidents<\/a>\u00a0caused by either negligent or malicious internal actors are a growing problem, having increased by 47 percent since 2018, according to the study &#8220;<a class=\"external-link external external_icon\" href=\"https:\/\/www.observeit.com\/cost-of-insider-threats\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">The Real Cost of Insider Threats in 2020<\/a>,&#8221; conducted by the Ponemon Institute and sponsored by IBM and ObserveIT. The average annual cost of an insider threat also went up by 31 percent during that time period, reaching $11.45 million.<\/p>\n<p>Negligent insiders are considerably more common than malicious ones, accounting for 62 percent of incidents. Criminal insiders are responsible for just 14 percent. However, the average cost per incident is higher for the criminal actors ($756,000) than it is for the merely careless ($307,000), according to the study.<\/p>\n<p>The\u00a0<a class=\"external-link external external_icon\" href=\"https:\/\/www.computing.es\/siteresources\/files\/904\/82.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">2019 Insider Threat Report<\/a>\u00a0from Bitglass paints a similar picture, with nearly 60 percent of organizations surveyed reporting that they experienced an insider attack during the past year, up from just one in three the previous year (2017). This seems to be partly driven by the move to cloud solutions and a lack of monitoring in that space: Only 40 percent of respondents to the Bitglass survey said they keep an eye out for unusual end user behavior across cloud apps, and the majority (56 percent) agreed moving to the cloud makes it harder to identify insider threats.<\/p>\n<h2>What You Can Do to Fight Back<\/h2>\n<p>Successfully stopping malicious outsiders from finding a foothold within your organization requires both technical and cultural measures. On the tech side, solutions that can lower the odds of an insider attack occurring include the following, according to the <a class=\"external-link external external_icon\" href=\"https:\/\/us-cert.cisa.gov\/sites\/default\/files\/publications\/Combating%20the%20Insider%20Threat_0.pdf\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">U.S. Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center<\/a>:<\/p>\n<ul>\n<li>Encryption<\/li>\n<li>Access management solutions<\/li>\n<li>Data loss prevention measures<\/li>\n<li>Digital rights management<\/li>\n<li>Database monitoring<\/li>\n<li>SIEM or other log analysis methods<\/li>\n<\/ul>\n<p>You can also implement a\u00a0<a href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"noopener noreferrer\">Zero-Trust Network Architecture<\/a>\u00a0with a Secure Access Service Edge (SASE), which only grants end users access to the specific resources they need to do their jobs. However, due to the social element of insider recruitment, technology alone can&#8217;t keep your organization safe. Security leaders should also work with HR to ensure the company maintains a positive culture that helps employees feel valued and fosters pride in their work and the company.<\/p>\n<p>Other social strategies you can use to lower the odds of insider attacks include the following, according to the DHS:<\/p>\n<ul>\n<li>Ensure through the hiring process that your staff members&#8217; attitudes match up with your organizational values.<\/li>\n<li>Give your employees processes for airing concerns and pain points to lower the odds of attacks driven by disgruntlement.<\/li>\n<li>Train your staff to recognize red flags in their colleagues&#8217; actions, such as destructive behavior, vocal frustration or disappointment with the company, and an apparent lack of ethics.<\/li>\n<\/ul>\n<p>Ultimately, given the growing prevalence and cost of insider-driven attacks, it&#8217;s imperative that security leaders act now to address this area of risk. If you&#8217;d like more information about adjusting your cybersecurity strategy to reduce your chances of experiencing a breach brought about by your own staff, our security team would be happy to offer guidance. Just give us a call at 877-599-3999 or email\u00a0<a class=\"external-link\" href=\"mailto:sales@stratospherenetworks.com.\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">sales@stratospherenetworks.com.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Elon Musk. Barack Obama. Jeff Bezos. Kanye West. What do all of these people have in common? Hackers recently succeeded in gaining access to their Twitter accounts, according to\u00a0NPR. After taking over these high-profile accounts, among others, the malicious actors &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":3731,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[263],"tags":[],"class_list":["post-3730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-corner"],"yoast_head":"<title>CISO Corner: How to Fight Insider Recruitment Tactics<\/title>\n<meta name=\"description\" content=\"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here&#039;s how you can combat this growing IT security threat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Corner: How to Fight Insider Recruitment Tactics\" \/>\n<meta property=\"og:description\" content=\"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here&#039;s how you can combat this growing IT security threat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-23T12:30:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-29T20:16:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2448\" \/>\n\t<meta property=\"og:image:height\" content=\"1224\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"How to Fight Insider Recruitment Tactics\",\"datePublished\":\"2020-07-23T12:30:42+00:00\",\"dateModified\":\"2020-07-29T20:16:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\"},\"wordCount\":780,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg\",\"articleSection\":[\"Cyber Corner\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\",\"name\":\"CISO Corner: How to Fight Insider Recruitment Tactics\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg\",\"datePublished\":\"2020-07-23T12:30:42+00:00\",\"dateModified\":\"2020-07-29T20:16:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here's how you can combat this growing IT security threat.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg\",\"width\":2448,\"height\":1224,\"caption\":\"A man in a dark suit is shown from the neck down pointing to a row of blue icons that look like men wearing ties. He's pointing to one that's red and wearing a hat, symbolizing an insider threat to security.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Fight Insider Recruitment Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"CISO Corner: How to Fight Insider Recruitment Tactics","description":"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here's how you can combat this growing IT security threat.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/","og_locale":"en_US","og_type":"article","og_title":"CISO Corner: How to Fight Insider Recruitment Tactics","og_description":"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here's how you can combat this growing IT security threat.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2020-07-23T12:30:42+00:00","article_modified_time":"2020-07-29T20:16:16+00:00","og_image":[{"width":2448,"height":1224,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"How to Fight Insider Recruitment Tactics","datePublished":"2020-07-23T12:30:42+00:00","dateModified":"2020-07-29T20:16:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/"},"wordCount":780,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg","articleSection":["Cyber Corner"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/","name":"CISO Corner: How to Fight Insider Recruitment Tactics","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg","datePublished":"2020-07-23T12:30:42+00:00","dateModified":"2020-07-29T20:16:16+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Malicious actors increasingly use insider recruitment to infiltrate corporate networks. Here's how you can combat this growing IT security threat.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/07\/ciso-corner-insider-recruitment.jpg","width":2448,"height":1224,"caption":"A man in a dark suit is shown from the neck down pointing to a row of blue icons that look like men wearing ties. He's pointing to one that's red and wearing a hat, symbolizing an insider threat to security."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/how-to-fight-insider-recruitment-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Fight Insider Recruitment Tactics"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3730"}],"version-history":[{"count":4,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3730\/revisions"}],"predecessor-version":[{"id":3747,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3730\/revisions\/3747"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3731"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}