{"id":294,"date":"2026-04-16T16:56:11","date_gmt":"2026-04-16T16:56:11","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jpabl004\/?p=294"},"modified":"2026-04-16T17:08:26","modified_gmt":"2026-04-16T17:08:26","slug":"the-human-factor","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jpabl004\/2026\/04\/16\/the-human-factor\/","title":{"rendered":"The Human Factor 200T"},"content":{"rendered":"\n<p>Julian Pablo<\/p>\n\n\n\n<p>CYSE200T<\/p>\n\n\n\n<p>Professor Skip Hiser<\/p>\n\n\n\n<p>April 4, 2026<\/p>\n\n\n\n<p>The Human Factor Write Up<\/p>\n\n\n\n<p class=\"has-text-align-center\">The Balance of Training and New Technology<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B.L.U.F: I believe the best course of action is to allocate more of the funds to training employees over more new cybersecurity technology.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The main reason why I believe this should be done is people are the foundation of any company; because of this it should be noted that would also mean biggest vulnerability of any company would be the people themselves. Without proper training it could mean threat actors would have much easier times exploiting people through means like social engineering.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Another reason is technology performance is only as good as the people managing them. Implementing new technology means new sets of protocols and usage that past training would be outdated for. &nbsp;&nbsp;\u201cIn technical fields, yesterday&#8217;s skills quickly become obsolete\u201d (<em>Why Employee Training is Best\u2026 , n.d<\/em>).<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Consistent employee training gives people an up-to-date same page perspective of their roles and responsibilities. This means there is less chance for errors and stay consistent throughout the job (<em>Why Employee Training is Best\u2026 , n.d<\/em>). &nbsp;In the cyber space this would entail not falling for social engineering tactics, strong policies followings like password security, and constant awareness of todays risks and vulnerabilities.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Funding towards new cybersecurity technologies is still important. Common systems like firewalls, IPS\/IDS, and SCADA are crucial to many different organizations. However, with the implantation of these systems employees need to be properly made aware of the use and management of them. There are also threats like insider threats that are able to slip under these systems and can mainly only be caught by people\u2019s recognition.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; In conclusion, training and cybersecurity technologies are both crucial, but prioritizing in training proves to have overall more benefits. You can have as many security systems in place, but it takes one person\u2019s slip up for all of it to collapse.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p><em>Why Employee Training is Your Best Investment: 10 Game-Changing Benefits for Your Business<\/em>, MCP      Technical Training, n.d, https:\/\/www.mcptechnicaltraining.com\/blog\/why-we-train-employees<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Julian Pablo CYSE200T Professor Skip Hiser April 4, 2026 The Human Factor Write Up The Balance of Training and New Technology &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; B.L.U.F: I believe the best course of action is to allocate more of the funds to training employees over more new cybersecurity technology. &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The main reason why I believe this should be&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jpabl004\/2026\/04\/16\/the-human-factor\/\">Read More<\/a><\/div>\n","protected":false},"author":32171,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/users\/32171"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/posts\/294\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jpabl004\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}