{"id":65,"date":"2025-11-24T03:40:49","date_gmt":"2025-11-24T03:40:49","guid":{"rendered":"https:\/\/student.wp.odu.edu\/tpayn013\/?p=65"},"modified":"2025-11-24T03:41:38","modified_gmt":"2025-11-24T03:41:38","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/student.wp.odu.edu\/tpayn013\/?p=65","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"Cyber technology has improved workplace efficiency, but it also increases the chances of human error and unethical behavior. As seen in the rise of workplace deviance, employees can easily misuse digital tools for personal gain, leak data, or engage in online procrastination during work hours. Because most cybersecurity incidents are still caused by human mistakes, such as weak passwords, phishing clicks, or accidental data sharing (Verizon, 2024), it is crucial to address the human factor through an assessed security strategy.<br \/>If I were the Chief Information Security Officer (CISO) managing a limited budget, I would share approximately 60 percent of funds toward employee training and 40 percent toward technical controls. Training empowers staff to recognize and respond to threats better, reducing insider risks that no tool can completely eliminate. Regular awareness sessions, phishing simulations, and clear policies help employees understand the real-world impact of their actions. As the earlier discussion on workplace deviance showed, even trusted insiders can unintentionally expose systems when oversight or understanding is low, which aligns with findings that human behavior remains a leading cause of breaches (Verizon, 2024).<br \/>At the same time, technology remains essential for enforcing compliance and detecting anomalies that us humans might miss, especially given the ongoing rise of human-error\u2013related breaches (Verizon, 2024). Investments in endpoint protection, data-loss prevention, and access-control tools can automate safeguards without overburdening employees. Together, human and technical defenses create a layered approach; one that recognizes people as both the strongest and weakest links in cybersecurity.<br \/>In conclusion, while advanced tools are valuable, cybersecurity ultimately depends on human behavior. Giving a slightly larger share of resources to training ensures that every employee becomes a proactive defender rather than a potential vulnerability.<br \/><br \/>Reference<br \/>Verizon. (2024). 2024 Data Breach Investigations Report. Verizon Enterprise. <br \/>https:\/\/www.verizon.com\/business\/resources\/reports\/2024-dbir-data-breach-investigationsreport.pdf <br \/>","protected":false},"excerpt":{"rendered":"<p>Cyber technology has improved workplace efficiency, but it also increases the chances of human error and unethical behavior. As seen in the rise of workplace deviance, employees can easily misuse digital tools for personal gain, leak data, or engage in <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/tpayn013\/?p=65\">Continue reading <span class=\"screen-reader-text\">  The Human Factor in Cybersecurity<\/span><span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":31484,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":5},"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/posts\/65"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/users\/31484"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=65"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/posts\/65\/revisions"}],"predecessor-version":[{"id":73,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=\/wp\/v2\/posts\/65\/revisions\/73"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=65"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=65"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/student.wp.odu.edu\/tpayn013\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=65"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}