Due to my limited budget, I would replace my human employees in the security field with cybersecurity automation. People cannot be entrusted with sensitive data and company securities. Data gets leaked and whether it is accidental or intentional by a disgruntled employee. Even with loads of money dumped into training employees, companies are still seeing many data breaches resulting in enormous company losses in both data and money. According to #Datacenterknowledge, companies that did not have automation deployed spent $6.7 million comparatively to companies with automation only spending $2.9 million on recovering data breaches. Many companies are seeing the benefit to implementing automation systems into their cybersecurity sector. According to cybersecurity automation adoption survey, produced by Threatquotient, 95% of companies have already automated parts of their cybersecurity processes. In #Capones article mentions how companies produce tons of data that cannot be kept up with manually, leaving data unprotected, in turn putting the company more at risk. On top of that, everything needs to be logged for further security. An automation solution automatically logs all the data for reporting and auditing purposes. Additionally, automation allows for security orchestration tools to take immediate action based on uncovered risks from the logs. The #Ponemon Report references that 52% of companies reported spending too much time and resources on activities such as threat detection and analysis. Automation services are instant and tasks that would take a security official hours to do, takes only a moment for such services. Automating tasks like data collection would make any company’s security operation run much more efficiently. Another big risk when having human employee’s vs automation is document copying and sharing. Even in benign cases, such as copying from financial data to make a presentation for the boss, once the information is copied onto another document, it has left the protection from the secured files accessibility. In the case of a centralized and automated approach, the information is protected wherever it is placed. These are some of many reasons I would go with the automated cyber approach. As Capone mentioned, people cannot be trusted, we humans want to take the quickest and easiest path to our ends meet which does not go hand in hand with cybersecurity.