Human Factors of Cybersecurity

In a company, having a budget is important; technology can’t solely secure a company. Having heavily trained personnel is the backbone of any good company. I believe the best way to split the fund up between training and additional technology would be a 60/40 split.

Training

Training will receive 60% of the budget because it is the backbone of the company; if you don’t have competent employees, then the company will crumble. “In 2024, 95% of data breaches were tied to human error, with cybersecurity” (Contreras et al., 2025). This shows how the lack of efficiently trained people leads to mishaps. It was said that “Investing in your team is one of the best ways to stay ahead of the threat” (Murray, 2025). We need to make sure that all of our employees know and fully understand the expectations of the mission. If we invest in the people, they will thrive, and it will overall help our company be more secure. It will also ensure that the new technology is fully understood. What good is new technology if the people aren’t trained to use it effectively?

Additional Cybersecurity Technology 

When it comes to the addition of cybersecurity technology, it should receive 40% of the budget. Training is the most important objective, but you can’t solely rely on it to do the job; the technology needs to constantly evolve to continue to fight the ever-evolving threats within the cybersecurity community. We must continue to implement the new technology to keep up with the times. A lot of businesses tend to neglect it because, as some would say, “if it ain’t broke, don’t fix it”, but if you don’t upgrade or add on to these systems, then you’re just exposing yourself to security risk. It’s important to keep growing and expanding cybersecurity technologies to evolve the company.

Conclusion

If we prioritize training over new additions, then we can create a stronger force. If we aren’t properly trained on all the technology, then we won’t be as effective at mitigating risk. We need to advance technology at a good pace and carefully learn all we can, so that we can effectively get the most out of each system, thus allowing us to combat the ever-evolving cybersecurity threats.

Leave a Reply

Your email address will not be published. Required fields are marked *