{"id":288,"date":"2025-06-29T03:00:36","date_gmt":"2025-06-29T03:00:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/pierceferguson\/?p=288"},"modified":"2025-06-29T03:00:36","modified_gmt":"2025-06-29T03:00:36","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/06\/29\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"The human factor is one of the most critical elements in cybersecurity. The employees would be the heart of the cybersecurity facility. Without them, the operation wouldn\u2019t be possible. As a Chief Information Security Officer, managing the organization\u2019s funds is crucial. This is how I would allocate between my team and the cybersecurity technology.<br \/>First things first, I prioritize the team over the technology and ensure that the employees receive the proper training needed to be up to date with the technology and risks. Knowledge holds power, and as long as everyone is informed, it will ultimately be more beneficial for the organization in the long run. Secondly, I would use the funds to see if the current infrastructure can be improved. If our current technology and systems are fully operable, there is no need to replace them yet.<br \/>Lastly, with the remaining funds, I would explore the possibility of applying additional tools and systems within our organization. With the team properly trained and the technology examined, we can now prioritize the systems that need upgrading, the systems that need replacing, or new systems that can be added. The funds are limited, so we must choose the technology that is more manageable and can provide more coverage at a lower cost.<br \/>","protected":false},"excerpt":{"rendered":"<p>The human factor is one of the most critical elements in cybersecurity. The employees would be the heart of the cybersecurity facility. Without them, the operation wouldn\u2019t be possible. As a Chief Information Security Officer, managing the organization\u2019s funds is crucial. This is how I would allocate between my team and the cybersecurity technology.First things&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pierceferguson\/2025\/06\/29\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":30972,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/288"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/users\/30972"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/comments?post=288"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/288\/revisions"}],"predecessor-version":[{"id":289,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/posts\/288\/revisions\/289"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/media?parent=288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/categories?post=288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pierceferguson\/wp-json\/wp\/v2\/tags?post=288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}