{"id":307,"date":"2025-11-06T18:21:30","date_gmt":"2025-11-06T18:21:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carterwakefield\/?p=307"},"modified":"2025-11-06T18:21:30","modified_gmt":"2025-11-06T18:21:30","slug":"human-factors-of-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/carterwakefield\/2025\/11\/06\/human-factors-of-cybersecurity\/","title":{"rendered":"Human Factors of Cybersecurity"},"content":{"rendered":"\n<p>In a company, having a budget is important; technology can\u2019t solely secure a company. Having heavily trained personnel is the backbone of any good company. I believe the best way to split the fund up between training and additional technology would be a 60\/40 split.<\/p>\n\n\n\n<p><strong>Training<\/strong><\/p>\n\n\n\n<p>Training will receive 60% of the budget because it is the backbone of the company; if you don\u2019t have competent employees, then the company will crumble. \u201cIn 2024, 95% of data breaches were tied to human error, with cybersecurity\u201d (Contreras et al., 2025). This shows how the lack of efficiently trained people leads to mishaps. It was said that \u201cInvesting in your team is one of the best ways to stay ahead of the threat\u201d (Murray, 2025). We need to make sure that all of our employees know and fully understand the expectations of the mission. If we invest in the people, they will thrive, and it will overall help our company be more secure. It will also ensure that the new technology is fully understood. What good is new technology if the people aren\u2019t trained to use it effectively?<\/p>\n\n\n\n<p><strong>Additional Cybersecurity Technology\u00a0<\/strong><\/p>\n\n\n\n<p>When it comes to the addition of cybersecurity technology, it should receive 40% of the budget. Training is the most important objective, but you can\u2019t solely rely on it to do the job; the technology needs to constantly evolve to continue to fight the ever-evolving threats within the cybersecurity community. We must continue to implement the new technology to keep up with the times. A lot of businesses tend to neglect it because, as some would say, \u201cif it ain\u2019t broke, don\u2019t fix it\u201d, but if you don\u2019t upgrade or add on to these systems, then you\u2019re just exposing yourself to security risk. It\u2019s important to keep growing and expanding cybersecurity technologies to evolve the company.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>If we prioritize training over new additions, then we can create a stronger force. If we aren\u2019t properly trained on all the technology, then we won\u2019t be as effective at mitigating risk. We need to advance technology at a good pace and carefully learn all we can, so that we can effectively get the most out of each system, thus allowing us to combat the ever-evolving cybersecurity threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a company, having a budget is important; technology can\u2019t solely secure a company. Having heavily trained personnel is the backbone of any good company. I believe the best way to split the fund up between training and additional technology would be a 60\/40 split. Training Training will receive 60% of the budget because it&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/carterwakefield\/2025\/11\/06\/human-factors-of-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31382,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/posts\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/users\/31382"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/posts\/307\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/posts\/307\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/media?parent=307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/categories?post=307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterwakefield\/wp-json\/wp\/v2\/tags?post=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}