Human Factor In Cybersecurity

What I have learned is that human behavior is more of an integral part of cybersecurity than I initially thought. On the other hand the digital aspect of cybersecurity is also important to maintain the integrity and efficiency of the system. 

How I would focus resources

Personally, what I would do is focus most of the resources at my disposal on the psychological side of security. This is because according to the Cyberbitsetc document and the website it cited, “With over 90% of successful breaches worldwide starting with a phishing email it is clear why cybercriminals concentrate on the psychological tools for planning and implementing the attacks.” This is a clear indicator that human behavior is something that must be a focal point on improving if I want to have a secure system. It is a lot easier for a criminal to infiltrate the system if the door is opened by someone inside the company unintentionally or not. Since it is the easiest way to breach the system, it is more likely to be attacked, therefore it deserves the most allocation of resources towards it.

With what I have left in the budget after addressing the psychological aspect of security I will use it to develop the digital side of it. One of the main problems is that manual management of data just isn’t feasible in a larger scale company. With the massive amounts of data being created by the company every day something would need to be put in place to help increase the overall integrity of the system. I would address this by automating all data protection, logging of all data, and detection of viruses and malware. By just automating these three main data management points the level of security would be improved greatly. I believe it would be all the company would need in terms of dealing with the digital aspect of cybersecurity.

Zurier, S. (2021, September 10). 91% of cyberattacks start with a phishing email. Dark Reading. Retrieved October 18, 2021, from https://www.darkreading.com/endpoint/91-of-cyberattacks-start-with-a-phishing-email

Leave a Reply

Your email address will not be published. Required fields are marked *