{"id":350,"date":"2024-12-03T16:11:47","date_gmt":"2024-12-03T16:11:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lexibowman\/?p=350"},"modified":"2025-04-21T14:36:41","modified_gmt":"2025-04-21T14:36:41","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/lexibowman\/2024\/12\/03\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"The Human Factor in Cybersecurity<br \/>Lexi Bowman<br \/>Given a limited budget, I would prioritize spending on cybersecurity training over additional<br \/>technology. However, it\u2019s important to invest in the right security tools as well to provide a<br \/>well-rounded defense strategy.<br \/>Overview<br \/>Cybersecurity is not just about technology; it\u2019s also about people. Employees can be a weak<br \/>point in any security system if they aren\u2019t properly trained to recognize threats such as phishing<br \/>or social engineering attacks (Jones &amp; Smith, 2022). At the same time, having strong<br \/>cybersecurity technology in place is crucial to defend against external and internal threats<br \/>(Williams, 2021). My plan would focus on balancing the two.<br \/>How I\u2019d Allocate the Budget<br \/>If I were to allocate a budget, I would dedicate approximately 60% to training programs that<br \/>focus on teaching employees how to recognize potential threats, understand the importance of<br \/>strong passwords, and follow best security practices. Human error is often the primary cause of<br \/>data breaches, and well-trained employees can significantly reduce the risk of an attack (Patel,<br \/>2023). The remaining 40% of the budget would go toward improving essential security<br \/>technology, such as firewalls, encryption software, and endpoint protection tools. These<br \/>technologies would help to create a robust defensive layer, reducing the effectiveness of potential<br \/>cyberattacks (Jones &amp; Smith, 2022).<br \/>Conclusion<br \/>In conclusion, while both cybersecurity training and technology are essential, a limited budget<br \/>would make training a higher priority because employees are often the weakest link in the<br \/>security chain (Williams, 2021). With sufficient training, staff can be better prepared to spot and<br \/>respond to cyber threats. However, it\u2019s still important to have strong security tools in place to<br \/>protect the organization from evolving cyber threats.","protected":false},"excerpt":{"rendered":"<p>The Human Factor in CybersecurityLexi BowmanGiven a limited budget, I would prioritize spending on cybersecurity training over additionaltechnology. However, it\u2019s important to invest in the right security tools as well to provide awell-rounded defense strategy.OverviewCybersecurity is not just about technology; it\u2019s also about people. Employees can be a weakpoint in any security system if they [&hellip;]<\/p>\n","protected":false},"author":29606,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/posts\/350"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/users\/29606"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/posts\/350\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lexibowman\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}