Did you ever wonder what is on your network? Did you even think are there bad guy in my network? How do I know.
Far too often networks have been compromised and the stakeholders have NO idea it is happening.
Fortunately, most ministrations are not at stealth as the bad buys want them to be. There are always evidence, tells of certain behavior that can and should raise some red flags.
But just as evidence system is only as good as it detection, you need to know when these activities are happening on your network. You need a radar system, NORAD, so type of early warning system that can notify you that something wrong is going on in your network. Most attack start at the endpoint since they are the most vulnerable. Not beachhead the operating has vulnerabilities, but because behind these devices are users. And depending on who the user is, easily found on linked in by the way, they can be compromised not in a day but over time 30 days 90 days even longer. That is why it is important you have the proper detection tools for your endpoints.
That way you can have peace on mind, because hackers don’t sleep.