{"id":298,"date":"2025-12-10T17:58:39","date_gmt":"2025-12-10T17:58:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/?p=298"},"modified":"2025-12-10T17:58:39","modified_gmt":"2025-12-10T17:58:39","slug":"cybersecurity-split","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/2025\/12\/10\/cybersecurity-split\/","title":{"rendered":"Cybersecurity Split"},"content":{"rendered":"\n<p class=\"has-large-font-size\"><strong>Balancing Training Vs. Technology<\/strong><\/p>\n\n\n\n<p><em>For the best balance there should be a 60% to employee training and 40% to essential technology split of the funds. Humans tend to be one of the weakest links to cybersecurity. They can also be one of the strongest links with proper training. Training the employees paired up with the smart technology investments can help with eventual mistakes.<\/em><\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Employee Training<\/strong><\/p>\n\n\n\n<p>Preventing the threats is better than trying to cure the threats. This is why the majority of the budget is being spent on physical training. The employees will be well equipped to recognize the threats before they spread and become greater than they should. Some steps may include:<\/p>\n\n\n\n<ul>\n<li>Phishing exercises to spot scams<\/li>\n\n\n\n<li>Role based training<\/li>\n\n\n\n<li>Interactive learning modules<\/li>\n\n\n\n<li>Regular refresher sessions and assessments<\/li>\n<\/ul>\n\n\n\n<p>This proactive, behavior focused training can help build a culture of security awareness. This is because humans tend to be a major risk factor. \u201c95% of data breaches involve human error\u201d (French, 2025), the investments can help those root causes of the errors.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Cybersecurity Technology<\/strong><\/p>\n\n\n\n<p>Although training employees is important, the technology that is needed can help fight against cyber errors. Here are some key areas of focus:<\/p>\n\n\n\n<ul>\n<li>Firewalls \u2014 filter network traffic and limit unauthorized access<\/li>\n\n\n\n<li>Endpoint protection \u2014 secure devices against malware<\/li>\n\n\n\n<li>Intrusion Detection and Prevention Systems \u2014 real time threat detection and response<\/li>\n\n\n\n<li>Multi-Factor Authentication \u2014 reduce risk from stolen or weak credentials.<\/li>\n<\/ul>\n\n\n\n<p>Although this is less focused on in the budget, it is still important to make sure there is high impact technology that can be a viable defense system. This technology can help the humans that can\u2019t see the threats that slip past the safeguard.&nbsp;<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>It is best to allocate the budget by using 60% of it to training and 40% to technology to gain the most effective balance. Since, training is the leading factor to most breaches, this is our first line of defence \u201cMimecast reports 95%\u201d (French, 2025). Meanwhile, the technology investments can help back up the structural protection. Together this can help optimize the financial efficiency and reduction of risk.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Reference&nbsp;<\/strong><\/p>\n\n\n\n<p>French, Laura. \u201c95% of Data Breaches Involve Human Error, Report Reveals.\u201d SC Media, 11 Mar. 2025, www.scworld.com\/news\/95-of-data-breaches-involve-human-error-report-reveals?utm_source=chatgpt.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Balancing Training Vs. Technology For the best balance there should be a 60% to employee training and 40% to essential technology split of the funds. Humans tend to be one of the weakest links to cybersecurity. They can also be one of the strongest links with proper training. Training the employees paired up with the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/2025\/12\/10\/cybersecurity-split\/\">Read More<\/a><\/div>\n","protected":false},"author":31617,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/298"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/users\/31617"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/comments?post=298"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/298\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/posts\/298\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/media?parent=298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/categories?post=298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gregori-piperidis\/wp-json\/wp\/v2\/tags?post=298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}