start your own trial today<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"Early threat detection is key to kicking out intruders.<\/p>\n","protected":false},"author":171,"featured_media":521379,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[1463,979,1],"tags":[],"cmv_author":[1551],"class_list":{"0":"post-521378","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-data-protection","8":"category-data-security","9":"category-uncategorized","10":"cmv_author-sam-curcuruto","11":"entry"},"yoast_head":"\n
Attackers Overstay Their Welcome | Blog<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n","yoast_head_json":{"title":"Attackers Overstay Their Welcome | Blog","description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","og_locale":"en_US","og_type":"article","og_title":"Attackers Overstay Their Welcome","og_description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","og_url":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-07-15T13:00:00+00:00","article_modified_time":"2024-07-12T18:34:22+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","type":"image\/png"}],"author":"unguyen","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"unguyen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"},"author":{"name":"unguyen","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c"},"headline":"Attackers Overstay Their Welcome","datePublished":"2024-07-15T13:00:00+00:00","dateModified":"2024-07-12T18:34:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"},"wordCount":830,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","articleSection":["Data Protection","Data Security","uncategorized"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","url":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome","name":"Attackers Overstay Their Welcome | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","datePublished":"2024-07-15T13:00:00+00:00","dateModified":"2024-07-12T18:34:22+00:00","description":"The average dwell time \u2013 an attacker\u2019s time in your environment before detection or executing their attack \u2013 is 204 days. For nearly seven months, attackers move around stealthily, discovering valuable data, understanding your infrastructure and backup environments, and planting back doors that give them persistent access to your organization even if you find and block them.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/attackers-overstay-their-welcome#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Attackers Overstay Their Welcome"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/dba72b5a781f4b5fd095bc52380eb45c","name":"unguyen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/564707f567262bb740287c608ef955e5?s=96&d=mm&r=g","caption":"unguyen"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/07\/Security-2-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/171"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=521378"}],"version-history":[{"count":1,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378\/revisions"}],"predecessor-version":[{"id":521380,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/521378\/revisions\/521380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/521379"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=521378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=521378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=521378"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=521378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}