The Human Factor in Cybersecurity

on

Nicholas Dent

CYSE 200T

When working within a limited budget as a CISO agent, I am tasked with balancing investments in cybersecurity technology. This is crucial for gaining and maintaining a strong defense against cyber threats. While both are essential, human behavior remains a significant vulnerability in the cybersecurity landscape. Therefore, resources being used must make training employees on security best practices their main priority, along with the investment in critical cybersecurity infrastructures to increase defenses and reduce risks.

There are two portions of the budget that should be directed at employee training, because the more human errors that continue, the more it will be one of the leading causes of cyberattacks in today’s world. Common cyber mitigation that I recommend when practicing safe online behaviors would be creating strong passwords and using 2FA to significantly reduce the likelihood of a breach. When a user starts using these practices, they ultimately develop a more security-aware culture. Consequently, users become the main defense system and help decrease the chance of risk from attacks on human vulnerabilities. Overall, employees should properly adopt these practices to mitigate potential threats. (Payne. p1)

Furthermore, cybersecurity technology assigns the rest of the budget, including firewalls, multi-factor authentication, and encryption of data. Most of these tools have shown to have foundational success in protecting the organization from malware, unauthorized access, and other software. The CISO should invest in technology to ensure that even if employees make mistakes, the network system will provide extra layers of protection to protect sensitive information.

In conclusion, the useful strategy that I find most effective for assigning a limited cybersecurity budget includes prioritizing employee training while also investing in useful cybersecurity technologies. Through the effort of focusing on both the human and technological aspects of security, most organizations can increase the chance of risks and create a more secure defense against cyberattacks. With the implementation of a strong technological defense, companies can provide a direct approach to cybersecurity that addresses both human and technical vulnerabilities in cyberspace.

(K. Payne, “Cybersecurity and Criminal Justice: Exploring the Intersections”, White-Collar Cybercrime: White-Collar Crime, Cybercrime, or Both? (Payne) )

Leave a Reply

Your email address will not be published. Required fields are marked *