Human Contribution to Cyber Threats

With having only a limited budget, companies need to determine how they would balance the tradeoff between training and additional technology. One can argue whether training or technology is more important, with both having good points. But I would have to agree with having additional technology as more important. My first reason is because of how much technology has been/ will be advancing over the years. Computers today can process more than 100 billion instructions per second compared to the first computer processor only being able to process 92,000 instructions per second (Isberto,2020). Having additional technology would also allow for fewer mistakes being made. Around 43 percent of data breaches are caused internally, whether that be accidentally or intentionally (Poremba,2021). Having additional technology would be able to cover up these data breaches made by human error.
But I wouldn’t put all my eggs in one basket either; not all of the budget should be put into additional technology because the training is important as well. Hackers come up with new types of ways to hack every day that having additional technology wouldn’t be able to solve. We need trained professionals that know what they’re doing to solve the new issues at hand. The psycho-technological matrix of cybersecurity threats shows cybersecurity threats depending on human psychology (Capone, 2018). The matrix contains a total of nine areas in which only three don’t involve so sort of human interaction. This alone shows the importance of needing human knowledge of cyber threats.

References
Capone, J. (2018, May 25). The impact of human behavior on security. Retrieved February 28,
2022.
Isberto, M. (2020, November 10). What makes a computer fast? Colocation America. Retrieved February 28, 2022, from https://www.colocationamerica.com/blog/what-makes-computers-fast
Pogrebna, G. (2020, February 14). Cybersecurity as a behavioural science: Part 1. CyberBitsEtc. Retrieved February 28, 2022, from https://www.cyberbitsetc.org/post/cybersecurity-as-a-behavioural-science-part-1
Poremba, S. (2021, March 10). Insider threats responsible for surprising amount of data loss. IT Business Edge. Retrieved February 28, 2022, from https://www.itbusinessedge.com/networking/insider-threats-responsible-for-surprising-amount-of-data-loss/

Leave a Reply

Your email address will not be published. Required fields are marked *