{"id":291,"date":"2025-04-06T17:25:30","date_gmt":"2025-04-06T17:25:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/?page_id=291"},"modified":"2025-04-06T17:25:30","modified_gmt":"2025-04-06T17:25:30","slug":"cybersecurity-on-a-budget","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/cybersecurity-on-a-budget\/","title":{"rendered":"Cybersecurity On A Budget"},"content":{"rendered":"\n<p>When it comes to splitting a cybersecurity budget, I think the smartest move is to focus on training employees first. You can have all the fancy security tools in the world, but if the company\/ people don\u2019t know how to use them, or don\u2019t know what to look out for, it&#8217;s pointless. A lot of security breaches actually happen because someone made a mistake, like clicking on a bad link or using a weak password. That\u2019s why investing in training helps stop problems before they even happen. #MinorityReport Plus if employees are trained well, they\u2019ll make better use of the technology the company already has. AFRAN014 says, \u201cWhen the organization is learning new technology, someone who is experienced with it is going to be needed to train the staff to use it properly\u201d To me that shows how tech and training have to go hand in hand.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Adding on to that, you can\u2019t forget about the tech side of it either. There needs to be a good balance. Cymulate says, \u201cTechnology investments are the keystone of every cybersecurity strategy, providing the tools needed to detect, block, respond to and monitor cyber threats.\u201d So yes, I believe that training is important, but you still need firewalls, antivirus programs and other tools to actually stop the threats. It&#8217;s kind of like having a security system for your house. Training is knowing how to lock the doors, but the tech is the ADT alarm that goes off if someone breaks in.&nbsp;<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;If I were in charge, I would have to look at what\u2019s most needed in the company. Like, are people making a lot of mistakes, or is the company missing basic protection tools? I think Cymulate explained it best, \u201cBy carefully evaluating these factors and aligning your cybersecurity budget with your company\u2019s unique needs, you\u2019ll be better positioned to protect your organization against evolving cyber threats.\u201d So I\u2019d start with training first, then add tech tools based on what\u2019s weak.&nbsp;<\/p>\n\n\n\n<p>Works Cited<\/p>\n\n\n\n<p>Cymulate. \u201cCybersecurity Budget Optimization: A Strategic Approach.\u201d&nbsp;<em>Cymulate<\/em>, 16 Oct. 2023,&nbsp;<a href=\"https:\/\/cymulate.com\/blog\/cybersecurity-budget-optimization\/\">https:\/\/cymulate.com\/blog\/cybersecurity-budget-optimization\/<\/a>.<\/p>\n\n\n\n<p>\u201cJournal \u2013 Budget Balance: Training vs. Tech.\u201d&nbsp;<em>ODU Cybersecurity Blog<\/em>, 1 Dec. 2024,&nbsp;<a href=\"https:\/\/sites.wp.odu.edu\/a428franz\/2024\/12\/01\/journal-budget-balance-training-vs-tech\/\">https:\/\/sites.wp.odu.edu\/a428franz\/2024\/12\/01\/journal-budget-balance-training-vs-tech\/<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to splitting a cybersecurity budget, I think the smartest move is to focus on training employees first. You can have all the fancy security tools in the world, but if the company\/ people don\u2019t know how to use them, or don\u2019t know what to look out for, it&#8217;s pointless. A lot of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/juan-hopkins\/cybersecurity-on-a-budget\/\">Read More<\/a><\/div>\n","protected":false},"author":30570,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/pages\/291"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/users\/30570"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/comments?post=291"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":292,"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/pages\/291\/revisions\/292"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/juan-hopkins\/wp-json\/wp\/v2\/media?parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}