Once inside a network, cybercriminals can lurk for long periods, quietly moving around and assessing what data is available and what it might be worth.
This activity can often continue without triggering alarms or providing warnings to the security team.
Overcoming this situation means using a new technique that makes it significantly easier to spot cybercriminals who have successfully entered a network.
It allows security teams to identify the threat and then take steps to remove it and minimise any damage or loss.