Human’s contribution to cyber threats tend to go unnoticed and we seem to give most credit to hackers. Throughout this weeks’ module we have learned about multiple ways humans contribute to cyber threats. Although we have only went over two point of views, while reading the “security vulnerabilities” a few of those can be considered human contributions as well. For example, weak physical protection, weak passwords, antique devices, etc. Humans don’t realize how much of a factor they could be in avoiding cyber threats. Making a strong password is the difference in the protection of important medical records or even the security of an important figure in a company. Updating your devices can be a tricky one depending on the device. With technology evolving comes pros and cons. For example, hackers are more than likely to have the most up to date material to hack into devices limiting them to only being able to hack into devices that meet certain updated software. Therefore, some antique devices could be better because they don’t have the updates protection which is most likely based off recent technology. Realizing that budgets are limited you have to split how you would like to protect devices. If I had to choose, I would rather spend my budget on additional technology. As humans, naturally we tend to do what’s easier and for example what would be easier is making a password short & easy to remember. Tradeoffs of training take a lot more work and trust. When I say that I mean working with people to get them to understand the importance of security is a hit or miss because as I stated before as a human, what’s easier is what’s better. As far as trusting people to apply what they learned is another battle within itself. Investing in peoples trust is a gamble. If I were to invest into additional technology it would require you to have certain software and criterion for a password. One example is when making an account, majority of companies have a password policy a specific character and special character count and number requirement. I think that’s the best way to secure an account and additional technology is what I would invest in when securing my company.