{"id":27270,"date":"2023-11-07T09:46:05","date_gmt":"2023-11-07T08:46:05","guid":{"rendered":"https:\/\/stage-fp.webenv.pl\/blog\/?p=27270"},"modified":"2023-11-09T12:47:53","modified_gmt":"2023-11-09T11:47:53","slug":"the-human-factor-in-cybersecurity-the-greatest-challenge-part-i","status":"publish","type":"post","link":"https:\/\/www.future-processing.com\/blog\/the-human-factor-in-cybersecurity-the-greatest-challenge-part-i\/","title":{"rendered":"The human factor in cybersecurity: the greatest challenge. Part I"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><br>The human factor in cybersecurity: the role of human element in cybersecurity<\/h2>\n\n\n\n<p>You can take care of all cybersecurity aspects of your organisation you can think of, but at the end of the day what can cost you dearly is not a software that failed, but a mistake done by your employee.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.continuitycentral.com\/index.php\/news\/technology\/6456-insider-cyber-incidents-human-error-is-the-top-cause-of-serious-data-breaches\" rel=\"noopener\">Statistics<\/a> say that in the <strong>last year 94% of organisations have experienced insider data breaches, with human error being the top cause of serious incidents, according to 84% of IT leaders<\/strong> surveyed. To understand the reasons, it&#8217;s enough to look at other statistics: 50% of respondents admitted to allowing family or friends to use their work-issued devices, while 58% of organisations report that employees ignore their cybersecurity guidelines.<\/p>\n\n\n\n<p>The significant role that individuals play in the overall security of digital systems, networks, and information is called <strong>the human factor.<\/strong> While technological advancements and sophisticated security measures are crucial in safeguarding against cyber threats, humans remain a critical element in both the success and vulnerability of these systems. <strong>Understanding and managing the human element is essential<\/strong> for achieving robust cybersecurity.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Addressing the problem: human risks that influence cybersecurity<\/h2>\n\n\n\n<p>Some of the best strategies that organisations can adopt to address the problem of human risks include <strong>cybersecurity training and awareness, strong password policies, employee monitoring and limiting access privileges<\/strong> \u2013 below we will look at them in more detail.<\/p>\n\n\n\n<p>It&#8217;s important to remember that addressing the human factor in cybersecurity requires <strong>a holistic approach that involves not only technology but also people, processes, and culture.<\/strong> By investing in education, training, and creating a security-conscious environment, organisations can significantly reduce the impact of human-related vulnerabilities and cybersecurity risks and enhance their overall cybersecurity posture.<\/p>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"Security_risks.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"885\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks.jpg\" class=\"attachment-full size-full\" alt=\"Security risks\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-300x277.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-768x708.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-434x400.jpg 434w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>            <\/a>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img fetchpriority=\"high\" decoding=\"async\" width=\"960\" height=\"885\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks.jpg\" class=\"attachment-full size-full\" alt=\"Security risks\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-300x277.jpg 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-768x708.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/Security_risks-434x400.jpg 434w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><br>How does human error relate to security risks?<\/h2>\n\n\n\n<p>As shown by the statistics, <strong>human error<\/strong> is one of the most significant contributors to security risks in the cybersecurity landscape. It refers to <strong>mistakes or oversights made by individuals that lead to vulnerabilities or security breaches within an organisation&#8217;s digital systems, networks, or data.<\/strong> Understanding how human error relates to security risks is crucial for implementing effective measures to prevent and mitigate a potential security incident.<\/p>\n\n\n\n<p>Some ways in which it contributes to security risks include:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Phishing and Social Engineering:<\/h3>\n\n\n\n<p>Phishing attacks rely heavily on employee behaviour. Cybercriminals send <strong>deceptive emails or messages that appear legitimate, tricking users into clicking on malicious links, downloading malware, or revealing sensitive information. <\/strong>Human error, such as not being vigilant about checking email sources or blindly following instructions, can lead to falling victim to these scams.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Weak Passwords and Credentials<\/h3>\n\n\n\n<p>Many security breaches occur due to weak passwords or credentials. Employees might use <strong>easily guessable passwords, reuse passwords across multiple accounts, or share login credentials,<\/strong> making it easier for attackers to gain unauthorised access to systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Misconfiguration<\/h3>\n\n\n\n<p>Configuring security settings incorrectly can lead to vulnerabilities. <strong>Misconfigured firewalls, cloud services, or network devices<\/strong> might inadvertently expose critical data or services to unauthorised users.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Unpatched Software<\/h3>\n\n\n\n<p>Failure to apply timely security patches and updates is another form of human error that exposes systems to known vulnerabilities. <strong>Outdated software can be exploited<\/strong> by cybercriminals to gain access to a network or compromise sensitive data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Data Mishandling<\/h3>\n\n\n\n<p>Human errors related to data handling can lead to significant security risks. For example, <strong>sending sensitive information to the wrong recipients, leaving sensitive documents unsecured, or improperly disposing of confidential data<\/strong> can all result in data breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Lack of Security Awareness<\/h3>\n\n\n\n<p>Employees who are <strong>not adequately trained or aware of cybersecurity best practices<\/strong> are more likely to make mistakes that compromise security. They may not recognise potential threats or may not know how to respond appropriately to security incidents.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Insider Threats<\/h3>\n\n\n\n<p>Insider threats happen when employees intentionally or unintentionally pose a risk to the organisation&#8217;s security. For instance, an employee might<strong> accidentally download malware or unknowingly share sensitive data<\/strong> with unauthorised individuals.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>Human-Induced System Failures<\/h3>\n\n\n\n<p>In complex IT environments, human factors can cause <strong>system failures or downtime<\/strong> that expose the organisation to potential attacks or data loss.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><br>Psychological manipulation in cybersecurity: an overview of phishing attacks<\/h2>\n\n\n\n<p><strong>Psychological manipulation<\/strong> is a key tactic used in cybersecurity, especially in phishing attacks. Phishing is a type of social engineering attack where cybercriminals use deceptive tactics to trick individuals into revealing sensitive information, such as login credentials, financial data, or personal details.<\/p>\n\n\n\n<p>These <strong>attacks exploit human psychology and emotions to increase the chances of success.<\/strong> Here&#8217;s an overview of phishing attacks and the psychological manipulation techniques they employ:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Impersonation:<\/strong> phishing emails often impersonate legitimate entities, such as banks, government agencies, or well-known companies. The attackers use familiar branding, logos, and email addresses to make the message appear authentic, instilling trust in the recipient.<\/li>\n\n\n\n<li><strong>Urgency and fear:<\/strong> phishing emails often create a sense of urgency or fear to prompt immediate action from the recipient. For example, they may claim that the recipient&#8217;s account will be suspended, or there is a security breach that requires immediate attention.<\/li>\n\n\n\n<li><strong>Curiosity:<\/strong> attackers may craft emails that pique the recipient&#8217;s curiosity, enticing them to click on a link or open an attachment to learn more. This technique leverages the natural human tendency to seek new information.<\/li>\n\n\n\n<li><strong>Reward and incentives:<\/strong> phishing emails may promise rewards, discounts, or exclusive offers to lure recipients into clicking on malicious links or providing sensitive information.<\/li>\n\n\n\n<li><strong>Personalisation: <\/strong>phishing emails might include personal information obtained from data breaches or social media profiles to make the messages appear more legitimate and increase the chances of success.<\/li>\n\n\n\n<li><strong>Manipulative language: <\/strong>phishing emails often use persuasive and manipulative language to create a sense of trust and credibility. They may use emotional appeals, flattery, or empathy to manipulate the recipient&#8217;s emotions.<\/li>\n\n\n\n<li><strong>URL obfuscation:<\/strong> attackers often hide malicious URLs behind hyperlinked text that appears legitimate. Hovering over the link may not reveal the true destination, leading recipients to click on dangerous links unwittingly.<\/li>\n\n\n\n<li><strong>Masquerading as a colleague or friend:<\/strong> in targeted attacks known as &#8220;spear phishing,&#8221; attackers impersonate someone known to the recipient, such as a colleague, friend, or family member, to lower the recipient&#8217;s guard and increase the likelihood of success.<\/li>\n\n\n\n<li><strong>Sense of familiarity: <\/strong>phishing emails may reference recent events or ongoing projects within the recipient&#8217;s organisation to create a sense of familiarity and credibility.<\/li>\n\n\n\n<li><strong>False sense of security:<\/strong> attackers may include statements claiming that the email is secure or has been scanned for viruses to deceive recipients into thinking the email is safe.<\/li>\n<\/ol>\n\n\n    <div class=\"b-image js-lightbox\">\n        <figure class=\"b-image__figure\">\n            <a\n                href=\"manipulation_techniques.jpg\"\n                class=\"js-lightbox__trigger\"\n                aria-haspopup=\"dialog\"\n                data-elementor-open-lightbox=\"no\"\n            >\n                <img decoding=\"async\" width=\"960\" height=\"1029\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques.jpg\" class=\"attachment-full size-full\" alt=\"manipulation_techniques phishing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-280x300.jpg 280w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-955x1024.jpg 955w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-768x823.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-373x400.jpg 373w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>            <\/a>\n                    <\/figure>\n        <div\n    class=\"js-lightbox__dialog o-lightbox\"\n    role=\"dialog\"\n    aria-modal=\"true\"\n    aria-hidden=\"true\"\n    tabindex=\"-1\"\n>\n    <div class=\"o-lightbox__dialog\">\n        <div class=\"o-lightbox__content js-lightbox__content\" role=\"document\">\n            <button\n                class=\"o-button o-button--xs o-button--dark o-button--icon-right o-button--tertiary o-lightbox__close js-lightbox__close m-gradient-brand\"\n            >\n                Close picture                <svg class='o-icon o-icon--16 o-icon--timescircle '>\n            <use xlink:href='#icon-16_times-circle'><\/use>\n          <\/svg>            <\/button>\n                                            <figure class=\"o-lightbox__image is-active\">\n                    <img decoding=\"async\" width=\"960\" height=\"1029\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques.jpg\" class=\"attachment-full size-full\" alt=\"manipulation_techniques phishing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques.jpg 960w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-280x300.jpg 280w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-955x1024.jpg 955w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-768x823.jpg 768w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2023\/11\/manipulation_techniques-373x400.jpg 373w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/>                                    <\/figure>\n                    <\/div>\n    <\/div>\n<\/div>\n    <\/div>\n\n\n\n<p>To protect against phishing attacks and psychological manipulation,<strong> individuals and organisations should be cautious about clicking on links or opening attachments in unsolicited emails, verify the sender&#8217;s email address <\/strong>and the legitimacy of the message before taking any action, <strong>use <a href=\"https:\/\/www.future-processing.com\/blog\/artificial-intelligence-usage-in-multi-factor-authentication\/\">multi-factor authentication<\/a> whenever possible<\/strong> to add an extra layer of security, <strong>regularly update and patch software<\/strong> to protect against known vulnerabilities and <strong>educate employees and stakeholders<\/strong> about phishing and cybersecurity best practices through training and awareness programs.<\/p>\n\n\n\n<p>By understanding the psychological tactics employed in phishing attacks and promoting cybersecurity awareness, individuals and organisations can better defend against these threats and protect their sensitive information.<\/p>\n\n\n\n<p>Stay tuned \u2013 the next article will further expand this broad topic. I will present some <strong>key strategies for improving employee cybersecurity awareness,<\/strong> and more.<\/p>\n\n\n<div class=\"b-cta-banner m-gradient-light\">\n            <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__image-container\" data-elementclick=\"article-banner\" data-elementname=\"Looking for software audits?\">\n            <img decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png\" class=\"attachment-full size-full\" alt=\"Cybersecurity_Consulting_Future_Processing\" srcset=\"https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing.png 450w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-300x300.png 300w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-150x150.png 150w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-400x400.png 400w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-24x24.png 24w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-48x48.png 48w, https:\/\/www.future-processing.com\/blog\/wp-content\/uploads\/2022\/12\/Cybersecurity_Consulting_Future_Processing-96x96.png 96w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>        <\/a>\n    \n        <a href=\"https:\/\/www.future-processing.com\/services\/cybersecurity\/cybersecurity-consulting\/\" class=\"b-cta-banner__url b-cta-banner__text-container\" data-elementclick=\"article-banner\" data-elementname=\"Looking for software audits?\">\n                    <div class=\"b-cta-banner__text\">\n                                                    <h3 class=\"f-headline-extra-big b-cta-banner__header\">\n                        Looking for software audits?                    <\/h3>\n                \n                                    <div class=\"f-paragraph\">\n                        <p>Is your software safe? Run an audit with experienced cybersecurity experts and find out.<\/p>\n                    <\/div>\n                \n                                    <div class=\"o-button o-button--primary o-button--s o-button--icon-right o-button--arrow\">\n                        <span>Let\u2019s talk<\/span>\n                        <svg class='o-icon o-icon--16 o-icon--arrow '>\n            <use xlink:href='#icon-16_arrow'><\/use>\n          <\/svg>                    <\/div>\n                            <\/div>\n                <\/a>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what your greatest challenge is when it comes to the cybersecurity of your organisation? It&#8217;s your employees and colleagues. In this article \u2013 the first of two speaking about the human factor in cybersecurity, I am discussing the role of human element in cybersecurity.<\/p>\n","protected":false},"author":182,"featured_media":27271,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2110],"tags":[],"coauthors":[2010],"class_list":["post-27270","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"acf":{"reading-time":"6 min","show-toc-sublists":false,"image":null,"logo":null,"button1":{"button1_type":"","button":null},"button2":{"button2_type":"","button":null},"person":{"person_photo":null,"person_name":"","person_position":""}},"_links":{"self":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/27270","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/users\/182"}],"replies":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/comments?post=27270"}],"version-history":[{"count":0,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/posts\/27270\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media\/27271"}],"wp:attachment":[{"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/media?parent=27270"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/categories?post=27270"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/tags?post=27270"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.future-processing.com\/blog\/wp-json\/wp\/v2\/coauthors?post=27270"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}