{"id":291,"date":"2023-04-16T22:18:03","date_gmt":"2023-04-16T22:18:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/?p=291"},"modified":"2023-04-16T22:18:03","modified_gmt":"2023-04-16T22:18:03","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/2023\/04\/16\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Abdul Barrie<br>Write- Up: The Human Factor in Cybersecurity<br>04\/02\/2023<br>The human factor is one of the most important factors to consider when it comes to<br>cybersecurity. Human mistakes continue to be the biggest cause of security breaches,<br>notwithstanding the gains that have been made in security solutions. According to IBM&#8217;s report on the cost of a data breach for the year 2020, human mistakes are the root cause of 23 percent of all data breaches. As a result, it is imperative to place a priority on the education and training of humans in the field of cybersecurity in order to lower the risk of cyberattacks.<br><br>Yet, striking a balance between the cost of extra cybersecurity equipment and the cost of further training can be a difficult undertaking, particularly when working with a constrained budget. The size of the company, the level of risk, and the kind of data that is being protected are some of the elements that will play a role in the decision that must be made on how limited funds should be allocated between training and technology.<br><br>Doing a risk assessment is the first thing that needs to be done before deciding how to<br>divide up the available funds. The identification of potential vulnerabilities and threats to an organization&#8217;s network, data, and information systems is one of the tasks involved in conducting a risk assessment. With this knowledge, firms are able to prioritize their cybersecurity needs and assign resources in accordance with those priorities. For instance, a company that knows it has a high risk of cyberattacks may decide that investing in technology is more important than training its employees.<br><br>Yet, it is essential to keep in mind that the use of technology alone is not sufficient to<br>ensure cybersecurity. Attackers are continually adapting their strategies, and new weaknesses are being found on a daily basis. For this reason, it is absolutely necessary to make financial investments in the training and education of staff members so that they are up to date on the most recent cybersecurity risks and the most effective procedures. Training staff on how to recognize phishing emails, how to generate secure passwords, and the need of maintaining up-to-date software are some examples of this type of measure.<br><br>Online courses, webinars, and in-person workshops are all examples of cost-effective<br>forms of professional development that companies may want to consider when resources are restricted. These training choices can be adapted to meet the distinctive requirements of the firm. Furthermore, they can be provided over the internet, which helps employees save money on transportation and lodging expenses.<br><br>In addition to training, businesses should also consider making investments in<br>cybersecurity technologies that are both efficient in terms of cost and offer the highest possible level of protection. For instance, purchasing a firewall for the organization&#8217;s network might add an extra layer of defense against potential threats. Also, making an investment in anti-malware software can assist in the detection and removal of malware from the systems utilized by the firm.<br><br>Nonetheless, it is essential to keep in mind that purchasing more equipment is not, by<br>itself, sufficient to ensure cybersecurity. It is of the utmost importance to guarantee that the technology is set up appropriately and that personnel are properly educated on how to make efficient use of it. It is possible, for instance, for a firewall to become useless if it is not configured appropriately or if one of the company&#8217;s employees accidentally turns it off. Hence, it is essential for businesses to establish a balance between their investments in technology and in training. Putting all of your money into technology rather than training your<br><br>Work Cited<br>New Markets Team Telef\u00f3nica Tech Cyber &amp; Cloud New Markets Team. \u201cHuman Factors in Cybersecurity: Protect Yourself.\u201d Think Big, 20 Dec. 2022, https:\/\/business.blogthinkbig.com\/human-factors-in-cybersecurity\/#:~:text=The%20human%20factors%20in%20Cybersecurity,for%20a%20company%20or%20organization. <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abdul BarrieWrite- Up: The Human Factor in Cybersecurity04\/02\/2023The human factor is one of the most important factors to consider when it comes tocybersecurity. Human mistakes continue to be the biggest cause of security breaches,notwithstanding the gains that have been made in security solutions. According to IBM&#8217;s report on the cost of a data breach for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abdulbarrie\/2023\/04\/16\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":26251,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/posts\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/users\/26251"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/posts\/291\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/posts\/291\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/media?parent=291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/categories?post=291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abdulbarrie\/wp-json\/wp\/v2\/tags?post=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}