{"id":300,"date":"2025-12-04T20:38:55","date_gmt":"2025-12-04T20:38:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/?p=300"},"modified":"2025-12-04T20:38:55","modified_gmt":"2025-12-04T20:38:55","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/2025\/12\/04\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Balancing a cybersecurity budget between training and technology requires a strategic<br>understanding of risk and human behavior. As Chief Information Security Officer, I would<br>allocate a significant portion of the budget toward employee training, recognizing that human<br>error is a leading cause of cyber incidents. Phishing attacks, poor password hygiene, and<br>misconfigured systems often stem from a lack of awareness rather than malicious intent.<br>Investing in role-specific training, phishing simulations, and gamified learning platforms builds a<br>resilient human firewall that complements technological defenses. This approach not only<br>reduces risk but also empowers employees to become active participants in the organization\u2019s<br>security posture.<br>Goswami, B. (2024, November 25). Balancing the budget: Human training or technology?<br>https:\/\/sites.wp.odu.edu\/bgoswcyse200t\/2024\/11\/25\/balancing-the-budget-human-training-or-tec<br>hnology-2\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Balancing a cybersecurity budget between training and technology requires a strategicunderstanding of risk and human behavior. As Chief Information Security Officer, I wouldallocate a significant portion of the budget toward employee training, recognizing that humanerror is a leading cause of cyber incidents. Phishing attacks, poor password hygiene, andmisconfigured systems often stem from a lack of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/raymondgriffin\/2025\/12\/04\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31060,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/users\/31060"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":301,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/posts\/300\/revisions\/301"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/raymondgriffin\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}