What are the several indicators of compromise(IOC) that organizations should monitor?

  • Unusual Outbound Network Traffic
  • HTML Response Sizes
  • Geographical Irregularities
  • Increases in Database Read Volume
  • Log-In Red Flags
  • Unexpected Patching of Systems
  • Large Numbers of Requests for the Same File
  • Web Traffic with Unhuman Behavior
  • Suspicious Registry or System File Changes
  • Unusual DNS Requests
  • Mobile Device Profile Changes
  • Bundles of Data in the Wrong Place
  • Mismatched Port-Application Traffic
  • Signs of DDoS Activity
  • Anomalies in Privileged User Account Activity