• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Preventing Errors: The Human Factor in Cyber Security

Natasha Lane / 5 min read.
May 28, 2018
Datafloq AI Score
×

Datafloq AI Score: 82.33

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/VRGcN

It seems that no matter how advanced cyber security systems get over time, the human factor always remains the greatest liability. When it comes to cyber attacks, most of the time the breach happened due to an employee’s misjudgment, carelessness, or simply lack of knowledge.

According to a research conducted by BakerHostetler that observed the causes of major security breaches in 2016, 24% of them were caused by employees‘ actions or mistakes. On top of that, 31% of issues happened because of malware, which could easily be counted among employees‘ mistakes. So, in total, over half of all security problems come from human errors. That is something that shouldn’t be ignored, especially in today’s world where the threat of cyber attacks is at an all-time high.

To keep this human factor at a manageable minimum, companies need to educate their employees and follow certain guidelines. Here is a list of things they should focus on.

Phishing

We’ve already mentioned that the staggering amount of attacks come from phishing malware. This is the most commonly used online scam that can cause anything from small data leak, to complete security breach depending on the intentions of the hacker. Most of the time, phishing emails come in the form of a normal message, imitating a real company or a professional, and ask the user to click on one of the links that are buried in the text. Once the user does that, the link uploads malware or a virus and infiltrates the victim’s system.

So, what can companies do about this threat? Well, the single most important thing they can do is educate their workers to recognize phishing emails. Most of the time, it’s just a matter of focusing on the details. Return Path blog offers a couple of quite useful pieces of advice:

  • Don’t fall for panic-inducing words in the subject line. It is most likely a trick to get you to ignore your better judgment and click without reading through the email.
  • Check for spelling mistakes in the email since real, professional companies don’t allow such mistakes.
  • Inspect the signature at the end and see whether the reply address corresponds to the sender’s address.
  • Hover over the included link to see the link’s destination in the bottom left of your browser. That way you can spot a fake location.
  • Obviously, the most important advice of all – always be on the lookout and don’t believe everything you read.


BYOD Policy

One of the biggest problems for cyber security is the BYOD policy that so many companies use to save up on money. BYOD stands for bring your own device principle where companies ask their employees to use their own equipment for work, both while at work and home. This is a bad practice because of the sensitive company data that could be disclosed through hacking or physical theft.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

If they don’t want to suspend their BYOD practices, companies could invest in more security measures. Security Magazine suggests, among other things, introducing a mechanism that detects the device’s integrity that causes company any damage. Besides that, it’s necessary to give the company the ability to wipe any sensitive data remotely and constantly monitor the use of devices. Although this might seem extreme, it’s necessary if they want to adhere to the BYOD principle.

While most of the cyber security agencies out there can track all of the users at all times, the companies also need to work on promoting individual responsibility. Employees need to be reminded that their risks are also company’s risks when they carry around work-related devices. This realization alone can help companies evade many potential security breaches.

Authentication

The problem with humans, unlike any machines, is that they’re inherently lazy and always looking for the simplest option. While it may work in certain parts of life, it is quite risky when it comes to security. Namely, most people use regular passwords, often consisting of easily searchable names or terms. Experienced hackers can easily crack these passwords and infiltrate the user’s system. Most of the time, they use social engineering to collect the necessary information and seize control.

That is why it’s important to use at least a 2-factor authentication whenever possible. The website Core states that this principle verifies a person by using three main elements – something that a person knows, something that he has, and something that he is. The first element checks whether you know the password or a PIN number. The second element looks for a physical object that will identify you like an identity card or a mobile phone. Finally, the third part uses biometrics to scan your face or eye for validation.

Some might say that the third part (biometrics) might cost the company too much. However, that is simply not true. iPhone already introduced the face-scan feature in their latest product, while they had the fingerprint method for years. Therefore, implementing this technology shouldn’t be a problem and is a good investment for the future.

Ethical Hackers

One of the best ways for companies to test their cyber security and the employees’ prudence is to hire ethical hackers. These security experts constantly test the security systems to find the holes and patch them. Admittedly, these hackers aren’t exactly cheap. The Telegraph states that some of the better ones can easily earn six figures. However, this should be considered an investment as they can save up much more in the long run. Ethical hackers can even hack individual employees and offer them priceless feedbacks.

In the end, it all comes down to educating the employees to become a little bit more aware of their role in the company’s security. If they practice caution, employees can easily avoid falling for phishing emails and be more responsible with the devices they use for work. Besides that, ethical hackers can show them all their security risks and help them get on board with two-factor authentication. Hopefully, in the future, the human factor will be a bit less of a liability on the web.

Categories: Cybersecurity, Privacy
Tags: advice, attack, authentication, BYOD, cyber, data protection, Data security, hackers, policy, privacy, security

About Natasha Lane

Natasha is a web designer, Java newbie, lady of a pen, paper, and keyboard and one hell of a tech geek. Her expertise could be summed up in IT, digital marketing and business-related topics. Her interests are, on the other hand, wide and ever-evolving. Natasha is always happy to collaborate with awesome blogs and share her knowledge about IT, digital marketing and technology trends via creating high-quality content.

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!