{"id":300,"date":"2022-04-21T00:00:19","date_gmt":"2022-04-21T00:00:19","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/domrhodes\/?p=300"},"modified":"2022-04-21T00:00:20","modified_gmt":"2022-04-21T00:00:20","slug":"to-train-or-not-to-train","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/domrhodes\/2022\/04\/21\/to-train-or-not-to-train\/","title":{"rendered":"To Train Or Not To Train"},"content":{"rendered":"\n<p><br><strong>Dominique Rhodes<\/strong><br><strong>Department of Cybersecurity, Old Dominion University<br>CYSE 200T: Cybersecurity-Technol-Society<br>Harry R. Cooper<br>02\/27\/2022<\/strong><\/p>\n\n\n\n<p><br>Jeff Capone said that \u201csecurity problems typically start with people\u201d, and I couldn\u2019t agree with him<br>more (Capone, 2018). I just must add that security problems also \u201ctypically\u201d are deterred by or<br>ended with people as well. I don\u2019t think that critical thinking and problem solving should be fully<br>automated because machines can malfunction just as quickly as a human can. I feel if you make<br>training a key piece of your security framework, it will pay off just as well as any high-priced<br>gadgets or programs. To me, people are a company\u2019s greatest asset. Therefore, with a limited<br>budget, I would have to treat employees as assets. Training is an investment.<br>If I am going to trade technology for training, I need to focus on effective training methods. I\u2019m<br>sure most companies require training on basic security measures such as phishing, piggy<br>backing, and things of that nature, but most of the time it\u2019s probably a one-time online course that<br>after completion you show your certificates and you\u2019re good to go. To me, that will lead to<br>complacency. How about we establish random live training after those courses. For example,<br>phishing is still the number one cyber threat with 91% of cyberattacks starting with a phishing<br>email (Zurier, 2016). I would have to do random fabricated phishing attempts routinely to ensure<br>that the training of the courses are effective. And if someone is hit by the training attack, then<br>there should be consequences which will lead to deterrence of future mishaps. This effect would<br>be like a kid touching a hot stove. Psychological events like these should produce some<br>technological benefits.<br>In the end, let\u2019s compare cybersecurity and cyberthreats to sex. The only true way to prevent<br>STDs and unplanned parenthood is through abstinence. You could have the strongest condom or<br>the most advanced birth control, but there would still be risks. Therefore, if you are going to<br>engage in sex, you need sex ed. The same goes for cybersecurity. No matter what technology<br>you have, your first line of defense will always be the training and education of your personnel.<br>So of course we are going to have the necessary technology to combat the war on cybersecurity,<br>but to balance it all we have to put the people on the front line.<\/p>\n\n\n\n<p><br><strong>References<\/strong><br>Capone, J. (2018). The impact of human behavior on cybersecurity, 1\u20133.<br>Zurier, S. (2016, December 13). 91% of cyberattacks start with a phishing email. Dark Reading.<br>Retrieved February 27, 2022, from<br>https:\/\/www.darkreading.com\/endpoint\/91&#8211;of-cyberattacks-start-with-a-phishing-email\/d\/d-id\/1327<br>704<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dominique RhodesDepartment of Cybersecurity, Old Dominion UniversityCYSE 200T: Cybersecurity-Technol-SocietyHarry R. Cooper02\/27\/2022 Jeff Capone said that \u201csecurity problems typically start with people\u201d, and I couldn\u2019t agree with himmore (Capone, 2018). I just must add that security problems also \u201ctypically\u201d are deterred by orended with people as well. I don\u2019t think that critical thinking and problem solving&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/domrhodes\/2022\/04\/21\/to-train-or-not-to-train\/\">Read More<\/a><\/div>\n","protected":false},"author":23381,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/users\/23381"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/posts\/300\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/domrhodes\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}