{"id":292,"date":"2025-12-07T17:01:45","date_gmt":"2025-12-07T17:01:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/?p=292"},"modified":"2025-12-07T17:01:45","modified_gmt":"2025-12-07T17:01:45","slug":"human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/2025\/12\/07\/human-factor-in-cybersecurity\/","title":{"rendered":"Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Being the Chief Information Security Officer (CISO), I would make human contributions to<br>cyber threats very seriously. With my limited balance, I would take the time to split my budget in<br>the best way for my company. The budget would be split between security tools and correctly<br>training the staff. It is important that staff are trained correctly because most incidents happen<br>within the staff. Like the incident in Nevada, an employee accidentally clicked on what they<br>thought was an actual website but ended up being malware. Training the staff can help avoid issues like this by being more careful when clicking on links. By putting the other half of my budget into security tools, it can help strengthen malware protection. Some malware protection tools I can invest in are Next-<br>Generation Antivirus (NGAV) and sandboxing security. NGAV is made to detect how attackers<br>operate. With this tool, it helps avoid threats that have been made before. Sandboxing security<br>gives extra protection to avoid potential threats. With balancing targeted employees with<br>strategic training and investment in better security tools, I can establish a stronger cybersecurity<br>approach.<\/p>\n\n\n\n<p>Citations<\/p>\n\n\n\n<ul>\n<li>Jones, David. \u201cNevada Ransomware Attack Traced Back to Malware Download by Employee.\u201d Cybersecurity Dive, 7 Nov. 2025, www.cybersecuritydive.com\/news\/nevada-ransomware-attack-traced-back-to-malware-download-by-employee\/805011\/.<\/li>\n\n\n\n<li>Hasnis, Aviad. \u201cMalware Protection: 6 Technologies to Protect Your Organization.\u201d Cynet, 9 Oct. 2025, www.cynet.com\/malware\/malware-protection-6-technologies-to-protect-your-organization\/.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Being the Chief Information Security Officer (CISO), I would make human contributions tocyber threats very seriously. With my limited balance, I would take the time to split my budget inthe best way for my company. The budget would be split between security tools and correctlytraining the staff. It is important that staff are trained correctly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/2025\/12\/07\/human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31486,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/users\/31486"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/posts\/292\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tyasiamcmillian\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}