{"id":295,"date":"2024-11-17T23:42:10","date_gmt":"2024-11-17T23:42:10","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/favour-anene\/?p=295"},"modified":"2024-11-17T23:49:14","modified_gmt":"2024-11-17T23:49:14","slug":"human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/favour-anene\/2024\/11\/17\/human-factor-in-cybersecurity\/","title":{"rendered":"Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Balancing the tradeoff between training and additional cybersecurity<br>technology requires a strategic approach. Here is how I would allocate the limited<br>funds:<br>1. Prioritize Training: Human error is a major factor in cybersecurity breaches.<br>According to a report by IBM, human error is responsible for 95% of cybersecurity<br>breaches (IBM, 2020). Therefore, investing in comprehensive training programs<br>for employees is crucial. This includes regular updates on the latest threats and best<br>practices.<br>2. Essential Technology Upgrades: While training is important, having robust<br>cybersecurity technology is essential. Technologies such as firewalls, intrusion<br>detection systems, and endpoint protection are fundamental. As noted by<br>Symantec, endpoint protection can block up to 99% of threats (Symantec, 2019).<br>3. Monitoring and Incident Response: Allocate funds for advanced monitoring<br>tools and incident response capabilities. Real-time network traffic analysis and log<br>file monitoring are crucial for detecting and responding to threats quickly.<br>According to a study by SANS Institute, continuous monitoring significantly<br>reduces the time to detect and respond to incidents (SANS Institute, 2021).<\/p>\n\n\n\n<p>4. Regular Audits and Assessments: Periodic security audits and vulnerability<br>assessments help identify potential weaknesses. A study by PwC highlights that<br>regular audits can improve an organization\u2019s security posture by up to 30% (PwC,<br>2020).<br>5. Balance and Flexibility: Maintain flexibility in the budget to adapt to emerging<br>threats and technologies. This might involve reallocating funds as needed based on<br>the evolving cybersecurity landscape. By focusing on both training and essential<br>technological defenses, while also ensuring continuous monitoring and<br>assessments, a balanced and effective cybersecurity strategy can be created within<br>a limited budget.<br>References:<br>&#8211; IBM. (2020). Cyber Security Intelligence Index Report.<br>&#8211; Symantec. (2019). Internet Security Threat Report.<br>&#8211; SANS Institute. (2021). Continuous Monitoring: The Key to Improved Security.<br>&#8211; PwC. (2020). Global State of Information Security Survey.<\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Balancing the tradeoff between training and additional cybersecuritytechnology requires a strategic approach. Here is how I would allocate the limitedfunds:1. Prioritize Training: Human error is a major factor in cybersecurity breaches.According to a report by IBM, human error is responsible for 95% of cybersecuritybreaches (IBM, 2020). Therefore, investing in comprehensive training programsfor employees is crucial&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/favour-anene\/2024\/11\/17\/human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":24192,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/295"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/users\/24192"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/comments?post=295"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/295\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/posts\/295\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/media?parent=295"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/categories?post=295"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/favour-anene\/wp-json\/wp\/v2\/tags?post=295"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}