{"id":290,"date":"2025-04-06T20:29:16","date_gmt":"2025-04-06T20:29:16","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/?p=290"},"modified":"2025-04-06T20:29:16","modified_gmt":"2025-04-06T20:29:16","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/2025\/04\/06\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>How I would Allocate my limited funds: There are many ways in which I could allocate my limited funds, but there are only a few methods that I would actually use and that seem most beneficial to me. One of the methods I would use would be risk assessment. I would identify what assets I have and determine which ones are most valuable and vulnerable. As Chief Information Security Officer it would also be important to make sure I know and have a clear understanding of the threats towards my organization and how impactful they can be. Another method I would use is the investment of essential technology. With the limited funds that I do have it would be good to make sure I have tools such as firewalls, antivirus software&#8217;s, and even intrusion detection systems. To add extra security to our systems I would make sure to have multi-factor authentication just to add an extra layer of security. There are more ways, but these two methods are the major starting methods that I would use to balance the tradeoff of training and additional cybersecurity technology.<br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How I would Allocate my limited funds: There are many ways in which I could allocate my limited funds, but there are only a few methods that I would actually use and that seem most beneficial to me. One of the methods I would use would be risk assessment. I would identify what assets I&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaylenkilby\/2025\/04\/06\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":30563,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/290"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/users\/30563"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/comments?post=290"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/290\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/posts\/290\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/media?parent=290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/categories?post=290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaylenkilby\/wp-json\/wp\/v2\/tags?post=290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}