{"id":3134,"date":"2022-01-31T15:21:57","date_gmt":"2022-01-31T15:21:57","guid":{"rendered":"https:\/\/itegriti.com\/kw022024\/?p=3134"},"modified":"2022-09-14T10:14:13","modified_gmt":"2022-09-14T10:14:13","slug":"threat-actors-often-choose-the-path-of-least-resistance","status":"publish","type":"post","link":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/","title":{"rendered":"Threat Actors Often Choose the Path of Least Resistance"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-one-full fusion-column-first fusion-column-last\" style=\"--awb-bg-size:cover;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-column-wrapper-legacy\"><div class=\"fusion-text fusion-text-1\"><p>Every threat actor around the world shares one thing in common: they\u2019re people. As such, they often look at their \u201cjob\u201d from the effort\/reward perspective. They ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, weaknesses which organizations might neglect in the absence of a robust security posture.<\/p>\n<p>Let\u2019s examine some examples below.<\/p>\n<p>&nbsp;<\/p>\n<h2>Commonly Exploited Vulnerabilities Are Older than You Think<\/h2>\n<p>Digital attackers understand that organizations don\u2019t always have the means to patch vulnerabilities affecting their systems on a timely basis. This explains why older vulnerabilities remain so popular among malicious actors. In July 2021, for instance, the FBI along with the Cybersecurity &amp; Infrastructure Security Agency (CISA) published a <a href=\"https:\/\/www.reliaquest.com\/resource\/white-paper\/when-your-organization-needs-more-than-mdr\/\" target=\"_blank\" rel=\"noopener\">joint advisory<\/a> with their national UK and Australian counterparts identifying 30 of the most common vulnerabilities exploited in the wild. The discovery dates for the list\u2019s top four flaws ranged from 2018 to 2020.<\/p>\n<p>Sometimes, digital attackers focus on misusing vulnerabilities even older than that. A 2021 survey noted that <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-11882\" target=\"_blank\" rel=\"noopener\">CVE-2017-11882<\/a>, a memory corruption vulnerability in Microsoft Office, accounted for nearly 75% of exploits in Q4 2020, reported <a href=\"https:\/\/healthitsecurity.com\/news\/hackers-successfully-exploiting-older-unpatched-microsoft-vulnerabilities\" target=\"_blank\" rel=\"noopener\">HealthITSecurity<\/a>. Similarly, an analysis of some of the vulnerabilities most frequently used by ransomware attackers revealed that organizations hadn\u2019t applied some security updates for almost a decade. One of the top five vulnerabilities was <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=cve-2012-1723\" target=\"_blank\" rel=\"noopener\">CVE-2012-1723<\/a>, a vulnerability affecting the Java Runtime Environment (JRE) component in Oracle Java SE 7 which first emerged in 2012. <a href=\"https:\/\/www.zdnet.com\/article\/ransomware-cyber-criminals-are-still-exploiting-years-old-vulnerabilities-to-launch-attacks\/\" target=\"_blank\" rel=\"noopener\">ZDNet<\/a> shared that\u00a0<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0431\" target=\"_blank\" rel=\"noopener\">CVE-2013-0431<\/a>, a bug in JRE, and <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-1493\" target=\"_blank\" rel=\"noopener\">CVE-2013-1493<\/a>, a flaw in Oracle Java, also made the list.<\/p>\n<p>&nbsp;<\/p>\n<h2>Other Low-Hanging Fruit Targeted by Attackers<\/h2>\n<p>Vulnerabilities might be one of the most common low-hanging fruit leveraged by attackers to target organizations without robust security postures. But it\u2019s not the only weakness of its kind. Provided below are several others.<\/p>\n<ul>\n<li><strong>Remote employees in an age of hybrid\/remote work<\/strong> \u2013 As noted by <a href=\"https:\/\/www.beyondtrust.com\/blog\/entry\/the-cyberattackers-path-of-least-resistance-is-shifting-heres-how-you-must-adapt\" target=\"_blank\" rel=\"noopener\">BeyondTrust<\/a>, many employees who work remotely use their own devices and\/or Wi-Fi networks to fulfill their job duties. That includes accessing and interacting with company assets hosted in the cloud. The problem is that IT and security can only do so much to enforce the security of those devices and networks. Indeed, it\u2019s possible that multiple people are sharing those devices and networks within the same household, thus raising the risk of a compromise. In the absence of other security measures like access controls, malicious actors might use those devices and networks to gain a foothold into the organization\u2019s systems.<\/li>\n<li><strong>Operational technology<\/strong> \u2013 As part of their digital transformation journeys, many industrial organizations are bringing together their Information Technology (IT) and Operational Technology (OT) environments. Not all OT systems are updated or patched, however. Some aren\u2019t even capable of receiving fixes remotely. Malicious actors can exploit these shortcomings to establish a foothold in an organization\u2019s infrastructure and disrupt its physical processes. All they need to do is exploit those assets\u2019 link to the IT side of things using a ransomware attack or similar offensive beforehand.<\/li>\n<li><strong>Employees in general<\/strong> \u2013 The digital threat landscape is evolving in such a way that employees can\u2019t keep up with new risks to their organizations. Security awareness training can help, but people are fallible, and malicious actors are committed to devising new techniques to prey on human weakness. This helps to explain why phishing remains such a prevalent attack category. Phishers don\u2019t need the expertise to exploit a technical vulnerability. They just need to craft a convincing lure that can trick an organization\u2019s human defenses into doing something that advances the phish.<\/li>\n<li><strong>Small- to medium-sized businesses<\/strong> \u2013 Finally, attackers set their sights on small- to medium-sized businesses (SMBs) for ransomware campaigns and other malicious activity. For example, a 2021 study found that 43% of ransomware victims were SMBs, wrote <a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/11\/24\/cyberattacks-are-sensationalized-daily-without-solutions-and-businesses-continue-to-take-the-hit\/?sh=13bb11a47646\" target=\"_blank\" rel=\"noopener\">Forbes<\/a>. Some SMBs assume that they\u2019re too small to be targeted, so they might not prioritize their cybersecurity efforts. Additionally, SMBs don\u2019t always have the budget to invest in cybersecurity, thus leaving them at greater risk of attack.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>What This Means for Digital Defense<\/h2>\n<p>It\u2019s true that malicious actors can use their knowledge of the low-hanging fruit to prey upon organizations with weak security postures. However, organizations can simultaneously work to address those areas of potential weakness so that they can raise the effort needed to successfully target them. They can do this by investing in a vulnerability management program that prioritizes security weaknesses and fixes them based upon their individual business risk, segmenting their IT and OT networks, and combining security awareness training with anti-phishing measures.<\/p>\n<p>All this can be difficult for some organizations to do on their own, however. That\u2019s where ITEGRITI comes in. The advisory firm provides customers with different types of services that will <a href=\"https:\/\/itegriti.com\/kw022024\/cybersecurity\/\" target=\"_blank\" rel=\"noopener\">align their cybersecurity programs to enterprise risks<\/a>, thus helping them to avoid data breaches and other costly security incidents. For example, it helps customers create processes, tools, and information for incident response and recovery; assists customers with their network security architecture design, segmentation, and redundancy; coordinates secure asset configuration and hardening across all types of environments including OT; as well as uses source and file validation and implementation to streamline security patching. What\u2019s more, ITEGRITI\u2019s team members use their experience to help customers <a href=\"https:\/\/itegriti.com\/kw022024\/compliance\/\" target=\"_blank\" rel=\"noopener\">navigate their regulatory compliance obligations<\/a> by instituting organizational change management and designing processes for key IT functions.<\/p>\n<p><a href=\"https:\/\/itegriti.com\/kw022024\/\">Eliminate your organization\u2019s low-hanging fruit with ITEGRITI today<\/a>.<\/p>\n<\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Every threat actor around the world shares one thing in common: they\u2019re people. As such, they often look at their \u201cjob\u201d from the effort\/reward perspective. They ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d<\/p>\n","protected":false},"author":12,"featured_media":3144,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[2188,2193,2192,2195],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.0 (Yoast SEO v23.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Threat Actors Often Choose the Path of Least Resistance<\/title>\n<meta name=\"description\" content=\"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Threat Actors Often Choose the Path of Least Resistance\" \/>\n<meta property=\"og:description\" content=\"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\" \/>\n<meta property=\"og:site_name\" content=\"kw022024\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/itegriti\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-31T15:21:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-14T10:14:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Bisson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DMBisson\" \/>\n<meta name=\"twitter:site\" content=\"@itegriti\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Bisson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\"},\"author\":{\"name\":\"David Bisson\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\"},\"headline\":\"Threat Actors Often Choose the Path of Least Resistance\",\"datePublished\":\"2022-01-31T15:21:57+00:00\",\"dateModified\":\"2022-09-14T10:14:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\"},\"wordCount\":1176,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg\",\"keywords\":[\"Cybersecurity\",\"Energy Sector\",\"Finance Sector\",\"Water Sector\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\",\"name\":\"Threat Actors Often Choose the Path of Least Resistance\",\"isPartOf\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg\",\"datePublished\":\"2022-01-31T15:21:57+00:00\",\"dateModified\":\"2022-09-14T10:14:13+00:00\",\"description\":\"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.\",\"breadcrumb\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg\",\"width\":800,\"height\":450,\"caption\":\"security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/itegriti.com\/kw022024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat Actors Often Choose the Path of Least Resistance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#website\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"name\":\"ITEGRITI\",\"description\":\"cybersecurity | compliance | managed services\",\"publisher\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#organization\",\"name\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\",\"url\":\"https:\/\/itegriti.com\/kw022024\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"contentUrl\":\"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png\",\"width\":600,\"height\":100,\"caption\":\"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services\"},\"image\":{\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/itegriti\",\"https:\/\/x.com\/itegriti\",\"https:\/\/www.linkedin.com\/company\/itegriti\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807\",\"name\":\"David Bisson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g\",\"caption\":\"David Bisson\"},\"description\":\"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/\",\"https:\/\/x.com\/DMBisson\"],\"url\":\"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Actors Often Choose the Path of Least Resistance","description":"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/","og_locale":"en_US","og_type":"article","og_title":"Threat Actors Often Choose the Path of Least Resistance","og_description":"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.","og_url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/","og_site_name":"kw022024","article_publisher":"https:\/\/www.facebook.com\/itegriti","article_published_time":"2022-01-31T15:21:57+00:00","article_modified_time":"2022-09-14T10:14:13+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg","type":"image\/jpeg"}],"author":"David Bisson","twitter_card":"summary_large_image","twitter_creator":"@DMBisson","twitter_site":"@itegriti","twitter_misc":{"Written by":"David Bisson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#article","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/"},"author":{"name":"David Bisson","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807"},"headline":"Threat Actors Often Choose the Path of Least Resistance","datePublished":"2022-01-31T15:21:57+00:00","dateModified":"2022-09-14T10:14:13+00:00","mainEntityOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/"},"wordCount":1176,"commentCount":0,"publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg","keywords":["Cybersecurity","Energy Sector","Finance Sector","Water Sector"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/","url":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/","name":"Threat Actors Often Choose the Path of Least Resistance","isPartOf":{"@id":"https:\/\/itegriti.com\/kw022024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage"},"thumbnailUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg","datePublished":"2022-01-31T15:21:57+00:00","dateModified":"2022-09-14T10:14:13+00:00","description":"Hackers ask themselves, \u201cHow can we get the greatest reward for the least amount of effort?\u201d The answer is to go after low-hanging fruit, those without a robust security posture.","breadcrumb":{"@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#primaryimage","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2022\/01\/itegriti_81_threat_actors.jpg","width":800,"height":450,"caption":"security"},{"@type":"BreadcrumbList","@id":"https:\/\/itegriti.com\/kw022024\/2022\/cybersecurity\/threat-actors-often-choose-the-path-of-least-resistance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/itegriti.com\/kw022024\/"},{"@type":"ListItem","position":2,"name":"Threat Actors Often Choose the Path of Least Resistance"}]},{"@type":"WebSite","@id":"https:\/\/itegriti.com\/kw022024\/#website","url":"https:\/\/itegriti.com\/kw022024\/","name":"ITEGRITI","description":"cybersecurity | compliance | managed services","publisher":{"@id":"https:\/\/itegriti.com\/kw022024\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/itegriti.com\/kw022024\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/itegriti.com\/kw022024\/#organization","name":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services","url":"https:\/\/itegriti.com\/kw022024\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/","url":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","contentUrl":"https:\/\/itegriti.com\/kw022024\/wp-content\/uploads\/2016\/06\/ItegritiLogo_600x100.png","width":600,"height":100,"caption":"ITEGRITI CORPORATION | Cybersecurity | Compliance | Managed Services"},"image":{"@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/itegriti","https:\/\/x.com\/itegriti","https:\/\/www.linkedin.com\/company\/itegriti\/"]},{"@type":"Person","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/35c7925615f1563d2c63d5099f40a807","name":"David Bisson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/itegriti.com\/kw022024\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a1800a198e4a12036a4f4eab95c049e?s=96&d=mm&r=g","caption":"David Bisson"},"description":"David Bisson is a security journalist who works as Contributing Editor for IBM's Security Intelligence, Associate Editor for Tripwire and Contributing Writer for Gemalto, Venafi, Zix, Bora Design and others.","sameAs":["https:\/\/www.linkedin.com\/in\/david-bisson-43335489\/","https:\/\/x.com\/DMBisson"],"url":"https:\/\/itegriti.com\/kw022024\/author\/david-bisson\/"}]}},"_links":{"self":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3134"}],"collection":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/comments?post=3134"}],"version-history":[{"count":11,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3134\/revisions"}],"predecessor-version":[{"id":3147,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/posts\/3134\/revisions\/3147"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media\/3144"}],"wp:attachment":[{"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/media?parent=3134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/categories?post=3134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/itegriti.com\/kw022024\/wp-json\/wp\/v2\/tags?post=3134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}