{"id":185,"date":"2024-11-18T04:20:56","date_gmt":"2024-11-18T04:20:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/?p=185"},"modified":"2024-11-18T04:20:56","modified_gmt":"2024-11-18T04:20:56","slug":"write-up-the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/2024\/11\/18\/write-up-the-human-factor-in-cybersecurity\/","title":{"rendered":"Write Up &#8211; The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Dante Sasaki<\/p>\n\n\n\n<p><br>CISO With A Limited Budget<\/p>\n\n\n\n<p><br>Creating The Best Defense For Systems<br>Cybersecurity training and technology investments are necessary for the most effective<br>defense possible. Having employees is needed to act as a firewall and to detect<br>phishing to protect systems and people that are on the other side of these systems.<br>Other ways that we safeguard these systems are by using endpoint security, email<br>security, multi-factor authentication, and firewall and network monitoring. A lot of the<br>budget should go to the advancements for employees and technology so that there are<br>continuous updates towards employees training and technology so that we can identify<br>new cyber threats based on the advancement of technology.<\/p>\n\n\n\n<p><br>Employees in cybersecurity<br>Employees in cybersecurity can cause a lot of vulnerabilities. Even though they can<br>cause vulnerabilities they are also helpful towards recognizing phishing attempts and<br>using safe tactics while using the internet. Also they are very helpful towards something<br>called a human firewall. This firewall can act as a well trained employee that knows how<br>to be a barrier towards any cyber threats. \u201cThis human firewall is built through<br>comprehensive training programs that emphasize the importance of cybersecurity and<br>equip employees with the tools they need to recognize and respond to threats.\u201d<br>Source:techbusinesshq.com<\/p>\n\n\n\n<p><br>Essential Technology For Cybersecurity<br>Some of the technologies that benefit cybersecurity are endpoint security, email<br>security, multi-factor authentication, and firewall and network monitoring. Endpoint<br>security is necessary because it helps protect desktops, laptops, and mobile phones<br>from malicious malware. It protects them by \u201cEndpoint detection and response (EDR)<br>software has advanced risk detection, investigation, and remediation capabilities. It is<br>an endpoint security solution that continuously monitors end-user devices to more<br>quickly detect and respond to security incidents.\u201d Email security helps to prevent<br>phishing emails that can cause you to give out your personal information and make<br>yourself vulnerable. Multi Factor authentication is a great way to make sure that only<br>people with authorized access can get into a system. It is cheap to add this multi factor<br>authentication and it drastically reduces the possibilities of people misusing or stealing<br>information. Lastly, firewalls prevent people\/hackers from getting into your system with<br>the sole intent to harm you.<br>Source:https:\/\/aws.amazon.com\/what-is\/endpoint-security\/<\/p>\n\n\n\n<p>Continuous Improvements<br>As technologies advance it becomes harder and harder to protect systems. This is<br>because different ways to harm people or systems are found, although we also do find<br>fixes for the previous threats. There will always be threats but the main purpose of<br>cybersecurity is to minimize the threats that are possible. A portion of the budget will go<br>towards cybersecurity monitoring and incident response tools. This is because I would<br>like to quickly detect and respond to threats that are found and to do this training and<br>technology will always be up to date.<\/p>\n\n\n\n<p><br>Conclusion<br>In conclusion, to have an effective cybersecurity team it is essential to have updated<br>training for employees and necessary technologies. Employees are crucial for a<br>company because they can act as a human firewall and identify phishing scams. By<br>always updating training programs and security tools we can identify new threats to<br>systems based on the advancement of technology and the advancements made in the<br>cybersecurity world. The main goal is to minimize the threats that can harm us or the<br>systems that keep us running.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dante Sasaki CISO With A Limited Budget Creating The Best Defense For SystemsCybersecurity training and technology investments are necessary for the most effectivedefense possible. Having employees is needed to act as a firewall and to detectphishing to protect systems and&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/2024\/11\/18\/write-up-the-human-factor-in-cybersecurity\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":29737,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/185"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/users\/29737"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/comments?post=185"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":186,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/posts\/185\/revisions\/186"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/media?parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/categories?post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse200t-dsasa001\/wp-json\/wp\/v2\/tags?post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}