{"id":297,"date":"2025-04-28T03:16:29","date_gmt":"2025-04-28T03:16:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/ncybersite\/?p=297"},"modified":"2025-04-28T03:16:29","modified_gmt":"2025-04-28T03:16:29","slug":"write-up-the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/write-up-the-human-factor-in-cybersecurity\/","title":{"rendered":"Write Up &#8211; The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Name: Noel Mcfee<br>Title: Balancing Human Training and Cybersecurity Technology<br>BLUF (Bottom Line Up Front):<br>With a limited cybersecurity budget, I would invest in employee training and awareness<br>with the additional budget going toward basic security technology as this is the best<br>approach to combat the human factor of cyber vulnerabilities.<br>Understanding the Human Factor<br>Human error is a major factor in cybersecurity vulnerabilities. Breaches happen due to<br>phishing scams and failed password selections, meaning people are always rendered<br>the weakest link. As CISO for the organization, I have the option to invest in one area<br>versus another to lessen risks to my organization.<br>Allocating the Budget<br>When budgets are constrained, I would allocate approximately 60% to human training<br>efforts and 40% to improved technological assets. This is because in the Verizon Data<br>Breach Investigations Report (2024), 84% of breaches are connected to human error.<br>Why Training Matters<br>Thus, by training employees, they can prevent problems from occurring rather than<br>waiting for a technological fix that is more reactive. For example, phishing simulations,<br>awareness of password protections, and required annual cybersecurity courses and<br>courses tailored to diverse departments are low cost solutions to creating a culture of<br>awareness before relying on overwhelming technological solutions.<br>Technology Investment<br>The balance of the budget would go toward basic security technologies such as<br>multifactor authentication (MFA), endpoint detection and response (EDR), and intrusion<br>detection systems (IDS). These are appropriate backups for any organization when it&#8217;s<br>impossible to assess or dictate how humans will behave.<br>Conclusion<br>By investing in both arenas equally, the overall goal of heightened security will be<br>achieved. Technology can be designed and patched every day, but humans are<br>susceptible to risks any time of day. To fund one over the other is counterintuitive and<br>the least effective financial expenditure that makes sense<\/p>\n\n\n\n<p>References<br>Verizon. (2024). Data Breach Investigations Report.<br>https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Noel McfeeTitle: Balancing Human Training and Cybersecurity TechnologyBLUF (Bottom Line Up Front):With a limited cybersecurity budget, I would invest in employee training and awarenesswith the additional budget going toward basic security technology as this is the bestapproach to combat the human factor of cyber vulnerabilities.Understanding the Human FactorHuman error is a major factor in&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/ncybersite\/2025\/04\/28\/write-up-the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29935,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/users\/29935"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/posts\/297\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ncybersite\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}