{"id":9163,"date":"2023-09-15T15:44:00","date_gmt":"2023-09-15T20:44:00","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=9163"},"modified":"2025-04-03T11:55:17","modified_gmt":"2025-04-03T16:55:17","slug":"solarwinds-3-strategies-minimizing-insider-threats-blog-2023","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/","title":{"rendered":"Three Strategies for Minimizing Insider Threats"},"content":{"rendered":"\n<p>Insider threats (alternatively known as careless or untrained insiders) continue to be a problem for the public sector. According to&nbsp;<a href=\"https:\/\/www.solarwinds.com\/resources\/survey\/public-sector-cybersecurity-survey\/delivery\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SolarWinds - Insider Threats Blog - 2023 - Survey\">SolarWinds 2023 Public Sector Cybersecurity Survey,<\/a>&nbsp;68% of respondents cited careless or untrained employees as one of the highest sources of security threats, second only to foreign governments.<\/p>\n\n\n\n<p>Insider threats have continued to increase over the past few years. Mobile work has become commonplace, and more employees have begun using unsanctioned applications, leading to incidents of shadow IT. Meanwhile, hackers have become adept at targeting government employees through phishing and ransomware attacks, which succeed due to human error.<\/p>\n\n\n\n<p>Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understand while not everyone is a trained security expert, everyone can play their part<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"625\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_Embedded.jpg\" alt=\"SolarWinds Cybersecurity Against Insider Threats Blog Embedded Image 2023\" class=\"wp-image-9423\" style=\"width:300px\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_Embedded.jpg 625w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_Embedded-300x300.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_Embedded-150x150.jpg 150w\" sizes=\"(max-width: 625px) 100vw, 625px\" \/><\/figure><\/div>\n\n\n<p>Some organizations tend to say, \u201cEveryone is responsible for cybersecurity,\u201d which is not entirely true. An employee in charge of processing applications for social security benefits is in charge of processing applications for social security benefits, not protecting the agency from a cyber attack.<\/p>\n\n\n\n<p>However, there are little things everyone can do to prevent threats\u2013they just need to know what those things are. It\u2019s more than not opening emails from unknown senders or clicking on suspicious-looking attachments. It\u2019s being vigilant, even when someone is feeling overworked. It\u2019s also knowing who to report these incidents to if and when they occur and how and when to share information with colleagues about potentially suspicious activity.<\/p>\n\n\n\n<p>Other things you can do to help employees protect your agency include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing company-wide password protocols, including two-factor authentication<\/li>\n\n\n\n<li>Mandating employees to change their passwords every few months<\/li>\n\n\n\n<li>Adding context to communications around cybersecurity to help employees understand the ramifications of cybersecurity incidents (for example, illustrating how a breach could impact employees\u2019 jobs)<\/li>\n<\/ul>\n\n\n\n<p>While rigorous training isn\u2019t necessary, you can aim to make safe security practices a part of your day-to-day efforts. For example, periodic email reminders, replete with simple and easy-to-follow best practices and sent from the CIO or security team, can help improve your organization\u2019s security posture.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conduct simulations to help employees understand how to respond to possible threats<\/h2>\n\n\n\n<p>Email reminders are important, but nothing beats practicing what to do in the event of a threat. Which is where Breach and Attack Simulations (BAS) come in.<\/p>\n\n\n\n<p>BASs can be used to simulate just about any type of attack your employees might be exposed to, including phishing, malware, and more. Employees are asked to spot, respond to, and prevent an attack in a simulation. Managers can assess employees\u2019 responses and reactions and discover where more education is needed.<\/p>\n\n\n\n<p>Simulated attacks are also great for increasing employee vigilance and education. The more employees are exposed to simulated threats, the more knowledgeable they become about those threats\u2013and the less likely they will be to fall prey to them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Build a zero-trust foundation that is secure by design<\/h2>\n\n\n\n<p>While employees should always be your first line of defense against cyberattacks, no defense is ever foolproof, even those that have been adequately trained and prepared. Implementing a secure by design zero-trust cybersecurity environment can ensure weaknesses aren\u2019t exploited.<\/p>\n\n\n\n<p>In a secure-by-design environment, security is inherent in every aspect of the organization. Employees are aware of possible cybersecurity risks and know how to prevent them. Security is baked into the agency\u2019s technology infrastructure and software development processes, and all technologies an agency procures have security as a standard feature, not an add-on.<\/p>\n\n\n\n<p>Security by design goes hand-in-hand with zero trust. Zero-trust cybersecurity models are based on an \u201cassume breach\u201d mentality, where every request to access information could pose a threat. Therefore, all requests must be carefully verified, and all employees should only have access to the information they need.<\/p>\n\n\n\n<p>Remember: while employees can be your agency\u2019s best defenders, they\u2019re also human. They can and will make mistakes. It\u2019s essential to put in place safeguards to mitigate those mistakes. Education is important, but so is having a backup plan in case something fails. By covering all angles you\u2019ll have a better chance of preventing the next employee-centric cyberattack.<\/p>\n\n\n\n<p><em>For more guidance on how to better enhance your agency\u2019s cybersecurity posture, visit&nbsp;<a href=\"https:\/\/www.solarwinds.com\/secure-by-design-resources\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"SolarWinds - Insider Threats Blog - 2023 - Bottom CTA\">SolarWinds&#8217; Secure by Design resource center.<\/a><\/em><\/p>\n<head><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\"><\/head>","protected":false},"excerpt":{"rendered":"<p>Insider threats (alternatively known as careless or untrained insiders) continue to be a problem for the public sector. According to&nbsp;SolarWinds 2023 Public Sector Cybersecurity Survey,&nbsp;68% of respondents cited careless or untrained employees as one of the highest sources of security &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":9922,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2,1493],"tags":[545,599,443],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Three Strategies for Minimizing Insider Threats | Carahsoft<\/title>\n<meta name=\"description\" content=\"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Three Strategies for Minimizing Insider Threats | Carahsoft\" \/>\n<meta property=\"og:description\" content=\"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"| Carahsoft\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-15T20:44:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T16:55:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1215\" \/>\n\t<meta property=\"og:image:height\" content=\"882\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Carahsoft Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Carahsoft Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\"},\"author\":{\"name\":\"The Carahsoft Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Three Strategies for Minimizing Insider Threats\",\"datePublished\":\"2023-09-15T20:44:00+00:00\",\"dateModified\":\"2025-04-03T16:55:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\"},\"wordCount\":738,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg\",\"keywords\":[\"Cybersecurity\",\"SolarWinds\",\"Zero Trust\"],\"articleSection\":[\"Cybersecurity\",\"Partners\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\",\"name\":\"Three Strategies for Minimizing Insider Threats | Carahsoft\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg\",\"datePublished\":\"2023-09-15T20:44:00+00:00\",\"dateModified\":\"2025-04-03T16:55:17+00:00\",\"description\":\"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg\",\"width\":1215,\"height\":882,\"caption\":\"SolarWinds Cybersecurity Against Insider Threats Blog Preview Image 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Three Strategies for Minimizing Insider Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| Carahsoft\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"Carahsoft\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"Carahsoft\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The Carahsoft Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The Carahsoft Team\"},\"description\":\"The Digital Media team at Carahsoft.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Three Strategies for Minimizing Insider Threats | Carahsoft","description":"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/","og_locale":"en_US","og_type":"article","og_title":"Three Strategies for Minimizing Insider Threats | Carahsoft","og_description":"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/","og_site_name":"| Carahsoft","article_published_time":"2023-09-15T20:44:00+00:00","article_modified_time":"2025-04-03T16:55:17+00:00","og_image":[{"width":1215,"height":882,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg","type":"image\/jpeg"}],"author":"The Carahsoft Team","twitter_misc":{"Written by":"The Carahsoft Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/"},"author":{"name":"The Carahsoft Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Three Strategies for Minimizing Insider Threats","datePublished":"2023-09-15T20:44:00+00:00","dateModified":"2025-04-03T16:55:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/"},"wordCount":738,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg","keywords":["Cybersecurity","SolarWinds","Zero Trust"],"articleSection":["Cybersecurity","Partners"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/","url":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/","name":"Three Strategies for Minimizing Insider Threats | Carahsoft","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg","datePublished":"2023-09-15T20:44:00+00:00","dateModified":"2025-04-03T16:55:17+00:00","description":"Educating your employees about the dangers of these attacks and putting in proper safeguards to prevent them is critical. Here are three strategies to help employees become more aware of threats and build a better security posture from the inside.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2023\/09\/SW-Cybersecurity-against-insider-threats-vendor-focused-blog_875x635.jpg","width":1215,"height":882,"caption":"SolarWinds Cybersecurity Against Insider Threats Blog Preview Image 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/solarwinds-3-strategies-minimizing-insider-threats-blog-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Three Strategies for Minimizing Insider Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| Carahsoft","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"Carahsoft","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/Carahsoft-Blue-Logo-Print.png","width":3184,"height":846,"caption":"Carahsoft"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The Carahsoft Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The Carahsoft Team"},"description":"The Digital Media team at Carahsoft.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9163"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=9163"}],"version-history":[{"count":4,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9163\/revisions"}],"predecessor-version":[{"id":9424,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/9163\/revisions\/9424"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/9922"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=9163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=9163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=9163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}