{"id":4615,"date":"2021-08-17T16:17:34","date_gmt":"2021-08-17T21:17:34","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=4615"},"modified":"2021-08-17T16:17:34","modified_gmt":"2021-08-17T21:17:34","slug":"what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/","title":{"rendered":"What Are Indicators of Behavior? How IoBs Can Help You Combat Cybersecurity Threats"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-medium wp-image-4616\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-300x180.jpg\" alt=\"A magnifying glass against a dark background with blue glowing circles surrounding the lens and red arrows, symbolizing cybersecurity monitoring.\" width=\"300\" height=\"180\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-300x180.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-1024x614.jpg 1024w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-768x461.jpg 768w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-1536x922.jpg 1536w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-2048x1229.jpg 2048w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo-200x120.jpg 200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>With new security threats emerging daily, it\u2019s incredibly difficult to stop hackers and malware from evading your defenses and infiltrating your network. Most (74 percent) of the malware detected during the first quarter of this year was <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/how-to-protect-your-business-from-the-growing-threat-of-zero-day-malware\/\" target=\"_blank\" rel=\"noopener\">zero-day<\/a> and subsequently capable of slipping past <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-services.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> solutions that rely on known signatures, according to a report from <a href=\"https:\/\/www.watchguard.com\/wgrd-resource-center\/security-report-q1-2021\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">WatchGuard\u2019s Threat Lab<\/a>.<\/p>\n<p>Due to the high probability of an advanced threat making it past defensive measures, high-level <a href=\"https:\/\/www.stratospherenetworks.com\/managed-detection-and-response.html\" target=\"_blank\" rel=\"noopener\">detection and response<\/a> solutions and services have become essential for businesses looking to spot the signs of a breach as quickly as possible and stop malicious actors and programs before they have the chance to cause extensive damage.<\/p>\n<p>Historically, security professionals have searched for Indicators of Compromise (IoCs), which are clues that signal an ongoing or upcoming cyberattack, according to <a href=\"https:\/\/www.fortinet.com\/resources\/cyberglossary\/indicators-of-compromise\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Fortinet<\/a>. However, some in the cybersecurity solutions space have advocated for switching to Indicators of Behavior (IoBs) to better combat threats in a world of widespread <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/why-your-business-needs-a-secure-remote-work-strategy-to-survive\/\" target=\"_blank\" rel=\"noopener\">remote work<\/a>, according to the TechRepublic article \u201c<a href=\"https:\/\/www.techrepublic.com\/article\/cybersecurity-pros-should-switch-from-indicators-of-compromise-to-indicators-of-behavior\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Cybersecurity pros should switch from Indicators of Compromise to Indicators of Behavior<\/a>.\u201d<\/p>\n<p>If you\u2019re a business leader curious about IoBs, how they compare to IoCs and whether they should be part of your cybersecurity strategy, here\u2019s some essential information to consider.<\/p>\n<h2>What Are Indicators of Behavior?<\/h2>\n<p>IoBs are end user behaviors security teams keep track of to assess the organization\u2019s risk level, according to the Forcepoint article \u201c<a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/indicators-of-behavior-iob\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Indicators of Behavior (IOBs) \u2013 With 2020 Vision<\/a>.\u201d Here are just a few examples:<\/p>\n<ul>\n<li>Sending email attachments<\/li>\n<li>Creating, sharing, uploading or downloading documents<\/li>\n<li>Accessing and exporting information stored in the cloud<\/li>\n<li>Utilizing collaboration solutions for messaging and sending attachments<\/li>\n<\/ul>\n<p>By monitoring IoBs, security professionals can learn what\u2019s typical for users and subsequently recognize anomalous behavior as well as identify sequences of IoBs that can indicate criminal behavior, the Forcepoint article explains. For instance, if an employee tries to exfiltrate proprietary data, the organization\u2019s security team might be able to catch them in the act after piecing together IoBs like copying information from a sensitive application, uploading info to a USB, and attempting to upload a large amount of data to a personal cloud solution.<\/p>\n<h2>How Do Indicators of Behavior Differ From Indicators of Compromise?<\/h2>\n<p>IoCs consist of data that signals potential infiltration, according to Fortinet. Some examples include the following:<\/p>\n<ul>\n<li>Atypical outbound network traffic<\/li>\n<li>Multiple failed login attempts or login attempts from users who don\u2019t exist<\/li>\n<li>Unusual HTML response sizes<\/li>\n<li>Numerous requests for one file<\/li>\n<li>Database read volume spikes<\/li>\n<\/ul>\n<p>While IoCs serve as documentation artifacts related to one action that\u2019s already happened, IoBs provide a lot more context about user, device and account behavior, according to the Forcepoint article \u201c<a href=\"https:\/\/www.forcepoint.com\/blog\/x-labs\/indicators-of-behavior-iob\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Shifting Gears from IOCs to IOBs<\/a>.\u201d By monitoring users\u2019 typical behavior, security teams can also give them an overall risk score and enable them to proactively predict malicious activity. They can also allow activity that might seem risky in isolation but that they know is necessary with context for a particular user.<\/p>\n<p>Ultimately, with new threats emerging every day and <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/the-ransomware-crisis-what-smbs-can-take-away-from-recent-attacks-on-big-businesses\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> hitting businesses of all sizes, it\u2019s crucial to invest in advanced cybersecurity solutions and services like <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-is-xdr-your-guide-to-extended-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">extended detection and response (XDR)<\/a>, <a href=\"https:\/\/www.stratospherenetworks.com\/office-anywhere.html\" target=\"_blank\" rel=\"noopener\">zero-trust network with secure access service edge (SASE)<\/a>, <a href=\"https:\/\/www.stratospherenetworks.com\/security-operations-center-as-a-service.html\" target=\"_blank\" rel=\"noopener\">Security Operations Center as a Service (SOCaaS)<\/a>, and <a href=\"https:\/\/www.stratospherenetworks.com\/cybersecurity-incident-response.html\" target=\"_blank\" rel=\"noopener\">incident response services<\/a>. Our security team has extensive experience maintaining optimal levels of cybersecurity for our clients and can answer any questions you might have about how to deploy an effective and comprehensive security strategy for your business.<\/p>\n<p>For details, give us a call at 877-599-3999 or email <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With new security threats emerging daily, it\u2019s incredibly difficult to stop hackers and malware from evading your defenses and infiltrating your network. Most (74 percent) of the malware detected during the first quarter of this year was zero-day and subsequently &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":4616,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-4615","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts<\/title>\n<meta name=\"description\" content=\"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts\" \/>\n<meta property=\"og:description\" content=\"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-17T21:17:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2235\" \/>\n\t<meta property=\"og:image:height\" content=\"1341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kevin Rubin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Rubin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\"},\"author\":{\"name\":\"Kevin Rubin\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"headline\":\"What Are Indicators of Behavior? How IoBs Can Help You Combat Cybersecurity Threats\",\"datePublished\":\"2021-08-17T21:17:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\"},\"wordCount\":613,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\",\"name\":\"What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg\",\"datePublished\":\"2021-08-17T21:17:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\"},\"description\":\"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg\",\"width\":2235,\"height\":1341,\"caption\":\"A magnifying glass against a dark background with blue glowing circles surrounding the lens and red arrows, symbolizing cybersecurity monitoring.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are Indicators of Behavior? How IoBs Can Help You Combat Cybersecurity Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5\",\"name\":\"Kevin Rubin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g\",\"caption\":\"Kevin Rubin\"},\"sameAs\":[\"http:\/\/stratospherenetworks.com\/\"],\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/\"}]}<\/script>","yoast_head_json":{"title":"What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts","description":"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/","og_locale":"en_US","og_type":"article","og_title":"What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts","og_description":"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2021-08-17T21:17:34+00:00","og_image":[{"width":2235,"height":1341,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg","type":"image\/jpeg"}],"author":"Kevin Rubin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kevin Rubin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/"},"author":{"name":"Kevin Rubin","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"headline":"What Are Indicators of Behavior? How IoBs Can Help You Combat Cybersecurity Threats","datePublished":"2021-08-17T21:17:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/"},"wordCount":613,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/","name":"What Are Indicators of Behavior (IoBs)? | Cybersecurity Concepts","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg","datePublished":"2021-08-17T21:17:34+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5"},"description":"Some cybersecurity professionals advocate for leveraging Indicators of Behavior instead of Indicators of Compromise to detect cyberattacks.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2021\/08\/futuristic-magnifying-glass-cybersecurity-photo.jpg","width":2235,"height":1341,"caption":"A magnifying glass against a dark background with blue glowing circles surrounding the lens and red arrows, symbolizing cybersecurity monitoring."},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/what-are-indicators-of-behavior-how-iobs-can-help-you-combat-cybersecurity-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Are Indicators of Behavior? How IoBs Can Help You Combat Cybersecurity Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/5e80dcea00878b83fb152245aa51b3f5","name":"Kevin Rubin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e0f1ab948ce542b3dd8def474bcde6faa8862614b72d26878c7755269b276e9?s=96&d=mm&r=g","caption":"Kevin Rubin"},"sameAs":["http:\/\/stratospherenetworks.com\/"],"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/kevin-rubin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4615","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=4615"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4615\/revisions"}],"predecessor-version":[{"id":4618,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/4615\/revisions\/4618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/4616"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=4615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=4615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=4615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}