{"id":66,"date":"2020-09-23T14:02:02","date_gmt":"2020-09-23T14:02:02","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/solutions\/?p=66"},"modified":"2020-09-23T14:02:02","modified_gmt":"2020-09-23T14:02:02","slug":"cybersecurity","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/","title":{"rendered":"CYBERSECURITY"},"content":{"rendered":"<h2>The Problem:<\/h2>\n<p>While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not overlook the importance of protecting against personnel and contractors.<\/p>\n<p>Did a disgruntled employee who was recently fired extract sensitive data on their way out with the intent to sell it or release it publicly? When it comes to cybersecurity, an ounce of protection goes a long ways. \u201cThe threat of insiders is real and what can happen is you have amazing defenses to protect your intellectual property and other secrets from those who are trying to obtain them from outside your company\u2019s walls, but you forget sometimes to have a program where you are watching those who you trust,\u201d said Assistant Attorney General for National Security John Carlin after the FBI arrested and charged an individual with theft of government secrets.<\/p>\n<h2>The Solution:<\/h2>\n<p>RecordTS records all user activity, guaranteeing that your organization has clear visibility into who is doing what, when, and why.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Problem: While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not&hellip;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-66","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CYBERSECURITY - Solutions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CYBERSECURITY - Solutions\" \/>\n<meta property=\"og:description\" content=\"The Problem: While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-23T14:02:02+00:00\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/\",\"name\":\"CYBERSECURITY - Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/#website\"},\"datePublished\":\"2020-09-23T14:02:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CYBERSECURITY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/\",\"name\":\"Solutions\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/solutions\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CYBERSECURITY - Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"CYBERSECURITY - Solutions","og_description":"The Problem: While insider threats can be accidental or negligent, they can sometimes be malicious. Though protecting devices and servers is necessary, organizations should not&hellip;","og_url":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/","og_site_name":"Solutions","article_published_time":"2020-09-23T14:02:02+00:00","author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/","url":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/","name":"CYBERSECURITY - Solutions","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/#website"},"datePublished":"2020-09-23T14:02:02+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/2020\/09\/23\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/solutions\/"},{"@type":"ListItem","position":2,"name":"CYBERSECURITY"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/#website","url":"https:\/\/www.tsfactory.com\/forums\/solutions\/","name":"Solutions","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/solutions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/solutions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/solutions\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/posts\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/comments?post=66"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/posts\/66\/revisions"}],"predecessor-version":[{"id":67,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/posts\/66\/revisions\/67"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/media?parent=66"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/categories?post=66"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/solutions\/wp-json\/wp\/v2\/tags?post=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}