{"id":305,"date":"2025-12-05T18:03:12","date_gmt":"2025-12-05T18:03:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/stevengeter6\/?p=305"},"modified":"2025-12-05T18:18:20","modified_gmt":"2025-12-05T18:18:20","slug":"human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/stevengeter6\/2025\/12\/05\/human-factor-in-cybersecurity\/","title":{"rendered":"Human Factor in Cybersecurity"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><br><em> This article explains that having slightly more funds for training can stop threats from building up and can grow the knowledge of basic security principles. After that, the rest of the funds can be placed for technology to fill the gaps that people can\u2019t fill themselves.<\/em><br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Human Training<\/mark><\/strong><br> With a focus on training more, larger attacks can be limited towards users. More than likely, a breach or threat can start towards people. From blr, \u201ca push for more training can allow employees to understand and respond appropriately to suspicious activities\u201d(blr). There can also be more confidence in the company by the employers knowing how to handle the digital platforms. With more confidence and communication, the technology doesn\u2019t have to play a higher role because the people in the business are ethically able to figure it out. An important factor in this is the skills that are taught to the employees. Software can have malfunctions, but skills and knowledge can be passed on and adapted (blr). Yes, this doesn&#8217;t mean that technology is completely bypassed, but training can have more important reasons to possess funds.<br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Technology<\/mark><br><\/strong>The remaining funds that I have, I would put towards technology. There would still be an effort of funds put in for productive technology, just not as much attention as human training. A main factor for why some funds would be put in is because of what technology can do that humans can\u2019t. The Training Industry explains, \u201cfirewalls and detection are working at a higher and faster rate to catch digital threats at their speed\u201d(Oesch,2019). This also provides for a safety net against error. Even with technology, there is a smaller chance of error than human knowledge, no matter how much training they have. The way threats are handled by technology makes it more significant as well. It processes more alerts and logs to use management systems to contain threats(Oesch,2019). Technology provides fast protection and increases the rate of detecting cyberattacks with fewer errors.<br><br><strong><mark class=\"has-inline-color has-vivid-red-color\">Conclusion<\/mark><\/strong><br> To conclude my explanation, funds for human training and technology have their valid reasoning for what needs more benefits. But having more funds in training allows for any risk to be lower and long-lasting. If budgets are tight, this makes it easier to manage what is needed because technology can be a reach in price. Even with the growth of technology, the foundation of human training is still essential.<br><br><br><br><br><br><br><br><br><br><br><br><br><strong><em>References<\/em><br><\/strong>\u201cEmployee training can strengthen your defense against digital threats.\u201d blr, blr, https:\/\/blr.com\/resources\/cybersecurity-facts-and-why-training-is-important\/. Accessed 13 November 2025.<br>Oesch, Taryn. \u201cWhy Funding for Cybersecurity Training Is Growing.\u201d Training Industry, Training Industry, 9 July 2019, https:\/\/trainingindustry.com\/blog\/compliance\/why-funding-for-cybersecurity-training-is-growing\/. Accessed 14 November 2025.<br> <br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article explains that having slightly more funds for training can stop threats from building up and can grow the knowledge of basic security principles. After that, the rest of the funds can be placed for technology to fill the gaps that people can\u2019t fill themselves. Human Training With a focus on training more, larger&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/stevengeter6\/2025\/12\/05\/human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31586,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/305"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/users\/31586"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"predecessor-version":[{"id":315,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/posts\/305\/revisions\/315"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevengeter6\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}