The Human Factor In Cybersecurity

There are two main factors within cybersecurity. The first factor is the obvious factor which is technology and computer networks. The second factor is the humans behind said technology and their computers. Most people believe that technology plays the biggest role in cybersecurity when in actuality it is the human factor that drives threats and attacks on a network. Most cybercriminals focus on the psychological aspect of cybersecurity in order to implement their attacks. This can be shown through the data that “over 90% of successful breaches worldwide starting with a phishing email” (Zurier, Steve).

   Now with my ‘company’ having a limited budget, it would not be possible to excel in both training and additional technology. There would have to be a tradeoff somewhere within the company in order to maintain optimal security with the given budget. Personally, I would put a focus on training my staff and leaders properly to ensure that they have the required knowledge to avoid leaving threats openly. Putting a priority on a proactive approach to our company’s safety. As well as include routine testing to show that the knowledge taught within training it still being implemented by members of the team.  

   However, not all of the budgets would go into training solely. The remaining budget would go into technology to advance the company and create barriers in order to protect the company’s network. As well as implement technology to detect internal threats whether or not done intentionally or accidentally. This would be another key focus due to “43% of data breaches being caused internally” (Poremba, Sue). No matter if these threats are caused with the intention to bring harm to the company’s network. The threats are still active to being exploited and causing a data breach within our company. That is why even with proper training a certain level of technology must be developed in order to create a safe environment.  

References

Capone, J. (2018). Capone – the impact of human behavior on security. Google Docs. Retrieved February 21, 2022, from https://docs.google.com/document/d/1J3v_V167mktbGVynbtHW8yHXW9onjaBzVASo-behDfY/edit

Google. (2020). Cyberbitsetc – why is cyber security about human behavior? Google Docs. Retrieved February 21, 2022, from https://docs.google.com/document/d/1QplIrfcKlmkSOuKt9i0Kte72kYrukFeCm1wj9DxpnGU/edit

Poremba, S. (2021, March 10). Insider threats responsible for surprising amount of data loss. IT Business Edge. Retrieved February 21, 2022, from https://www.itbusinessedge.com/networking/insider-threats-responsible-for-surprising-amount-of-data-loss/

Zurier, S. (2016, December 13). 91% of cyberattacks start with a phishing email. Dark Reading. Retrieved February 21, 2022, from https://www.darkreading.com/endpoint/91-of-cyberattacks-start-with-a-phishing-email

Leave a Reply

Your email address will not be published. Required fields are marked *