{"id":304,"date":"2026-05-02T23:04:17","date_gmt":"2026-05-02T23:04:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/daveluc\/?p=304"},"modified":"2026-05-02T23:04:17","modified_gmt":"2026-05-02T23:04:17","slug":"cybersecurity-and-privacy-best-practices-are-not-just-technical-issues","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/daveluc\/2026\/05\/02\/cybersecurity-and-privacy-best-practices-are-not-just-technical-issues\/","title":{"rendered":"Cybersecurity and privacy best practices are not just technical issues."},"content":{"rendered":"\n<p><em>Cybersecurity and privacy best practices are not just technical issues because they depend heavily on human behavior, organizational policies, and everyday decision-making<\/em>,\u00a0not only on firewalls or encryption. Even the strongest technical controls can be undermined if people do not understand or follow proper security practices. Users choose weak passwords, fall for phishing emails, reuse credentials, or ignore software updates, which creates vulnerabilities regardless of how advanced the system is. A real-world example of how people and processes affect cybersecurity is when I tried to purchase a ticket for a festival and discovered someone was attempting to scam me. The scam did not rely on hacking a system; instead, it relied on manipulating me as a person through trust and urgency. The scammer tried to convince me to send money without using a secure or verified ticket platform, which shows how human behavior plays a major role in security outcomes. If I had not been cautious and questioned the process, I could have lost money and personal information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity and privacy best practices are not just technical issues because they depend heavily on human behavior, organizational policies, and everyday decision-making,\u00a0not only on firewalls or encryption. Even the strongest technical controls can be undermined if people do not understand or follow proper security practices. Users choose weak passwords, fall for phishing emails, reuse credentials,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/daveluc\/2026\/05\/02\/cybersecurity-and-privacy-best-practices-are-not-just-technical-issues\/\">Read More<\/a><\/div>\n","protected":false},"author":31990,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/users\/31990"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/posts\/304\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/daveluc\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}