{"id":297,"date":"2025-11-23T21:13:40","date_gmt":"2025-11-23T21:13:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/orionpeacock\/?p=297"},"modified":"2025-12-04T18:33:21","modified_gmt":"2025-12-04T18:33:21","slug":"balancing-cybersecurity-investments-training-vs-technology","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/orionpeacock\/2025\/11\/23\/balancing-cybersecurity-investments-training-vs-technology\/","title":{"rendered":"Balancing Cybersecurity Investments: Training vs. Technology"},"content":{"rendered":"\n<p>In this write-up, we explore the role of cybersecurity investments to better understand the<br>vulnerabilities that arise from human error and technological gaps, and how a combination of<br>training and cybersecurity tools can help reduce these risks. Employees play a vital role in<br>maintaining organizational security, while technological defenses provide automated protection<br>against a wide range of threats. Because both human and system factors are critical to<br>organizational safety, allocating limited resources effectively has become a top priority for<br>security leaders and organizations alike.<br>Promoting Human Training to Mitigate Cyber Risks<br>As Chief Information Security Officer, the challenge of allocating the limited funds<br>provided should consider a careful balance of both human and technological resources. Human<br>factors continue to be a primary contributor towards cybersecurity incidents, as employees<br>inadvertently introduce risks through their susceptibility to phishing attacks, the utilization of<br>weak passwords, or simple misconfigurations. According to Bill Buchanan, \u201cThe greatest threat<br>to information security is actually people\u201d (p. 1). This reality emphasizes the importance of<br>targeted training programs that educate staff about potential threats and reinforce secure<br>behaviors. Humans are consistently the problem in cybersecurity incidents so it is vital to direct a<br>portion of the available funds towards the weakest point of a company\u2019s cybersecurity. We<br>should fund the basics in password education, phishing education, and ways to identify<br>irregularities in websites to notice potential harmful or false sites. Keeping staff educated on<br>what to avoid mitigates the amount of funding that would be required to prevent, or repair any<br>mistakes made by employees simply not knowing any better.<br>Leveraging Technology for Automated Cybersecurity Defenses<br>On the technological side, investing in cybersecurity tools such as intrusion detection<br>systems, endpoint protection, and network monitoring software would provide automated<br>defenses able to reduce the impact of attacks. They would also offer continuous protection from<br>threats even when human error persists despite training. There is also the factor of some people<br>simply not caring about whether or not something poses a risk. Some people think the risk is<br>either small enough to not matter or simply decide to not acknowledge it. In addition humans are<br>naturally flawed and are prone to mistakes, training would only be able to mitigate the instances<br>where incidents occur. This makes having strong and capable technology vital to be able to<br>recover from breaches no matter how small. Having automation capable of stopping or<br>preventing further damage helps to form a balance in ensuring safety and security. In order to<br>balance these priorities though it means allocating funds in a way that supports a layered<br>approach. Initial investments in human training are able to reduce preventable errors, and when<br>all else fails we can resort to automated precreated technology to support the functionality and<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>security of a company. We also would have to factor in the chance for errors within technology<br>outside of human control. While much less common there is still the chance for technology to<br>fail which gives another reason to dedicate a larger portion of the funds towards automated<br>security.<br>Conclusion<br>I would allocate more funds towards the automation, because even though educating staff<br>is important errors will still persist despite what education is given. So having strong reliable<br>failsafes allows for the errors or noncompliance to safely occur. By adopting a balanced<br>approach that still prioritizes strong and capable technology, I would be able to maximize the<br>effectiveness of limited funds provided to me, Still promoting knowledge of what is safe and<br>what is risky while maintaining a focus on full automated defenses. Combining education and<br>tools ensures that both human and system vulnerabilities are addressed, enabling the organization<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this write-up, we explore the role of cybersecurity investments to better understand thevulnerabilities that arise from human error and technological gaps, and how a combination oftraining and cybersecurity tools can help reduce these risks. Employees play a vital role inmaintaining organizational security, while technological defenses provide automated protectionagainst a wide range of threats. Because&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/orionpeacock\/2025\/11\/23\/balancing-cybersecurity-investments-training-vs-technology\/\">Read More<\/a><\/div>\n","protected":false},"author":31443,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[3,1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/posts\/297"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/users\/31443"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/posts\/297\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/orionpeacock\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}