Tuesday, 2 June 2015

The Human Error Risk in Cyber Security

Is The Future Cyborg?  Waking Up to the Human Error Risk in Cyber Security

By Stuart Peck, Pre-Sales Manager, ZeroDayLab

Human achievement is incredible, just look at digital technology and the internet, but people can also make mistakes.  When APTs are increasing and targeting weaknesses in staff and suppliers to overcome improved technical defences; can organisations control the risk of human fallibility or is the only answer to employ cyborgs?

Since 2012 there has been a 51% increase in security budgets, yet incidents are up 25% and financial costs of a breach are up 18% (The Global State of Information Security Survey 2014, PWC).  The importance of implementing improved security technologies is irrefutable and this is exactly why exploiting human weakness has become the lucrative path for cyber criminals from poor configuration and password management to social engineering and spear phishing.

IBM’s 2014 Cyber Security Intelligence Index cites human error as a contributing factor in 95% of incidents.  What we regularly see in businesses is an improved top-level approach employing technology, technical controls and automation but the technology is in reality just the safety net.  What is lacking is an understanding throughout organisations of the individual’s contribution to security both on and offline.  To achieve this, a top-down cyber strategy is required involving a combined focus on people, process and technology.

People as the First Line of Defence

When human error can happen even within IT teams who know best (we regularly come across admin accounts with passwords set as ‘admin’) how do you motivate your privileged insiders, staff and third party suppliers to be the first line of defence?

Current office culture creates a belief that it is IT’s role to protect the organisation, not staff members or third party suppliers.  Simple things such easy-to-guess passwords, carrying data on USBs, leaving desktops unlocked, or opening attachments may not be something people may be aware of.

Organisations winning the fight with human error have shifted their focus to processes and training in four areas:

1) People 
Regular education programmes are key; highlighting the individual’s role in security, the latest threats and how they target people (both on and offline), policies, procedures and just as importantly the consequences of human error; namely fines, reputation/brand damage and loss of business.  Tailor it to departments and roles and aim to refresh training at a minimum of every 6 month

2)  Processes 
Tighten processes and procedural controls from application implementation and administrator controls, to privileged access, data handling and also physical office security.

3) Test & Review 
Some organisations test their internal controls by sending phishing attacks to their own staff.  That way, they can identify who would benefit from further security awareness training.  Similarly physical security processes should be audited on a regular basis.

4)  Technology testing 
Applications and websites develop and change and weaknesses can appear in code and privileges.  Ensure you have a regular and frequent penetration testing plan to ensure all controls are properly in place and are keeping pace with changes in the external threat environment.

Do we need cyborgs?  While they might be the ultimate hybrid of the human and technology, we can mitigate the risk of human error with the right strategy.  To err is human; people, process and technology is the divine.

We ask this question to you; How do you motivate your users (and other binding parties) to be the first line of defence/IT Security conscious? 


  1. I started playing at simply free online slots after reading reviews from other players and I see that it’s not for nothing. Judging by the number of reviews on the Internet, it seems that only the lazy one did not play here)) Well, by the number of reviews and topics on the forums one can definitely say that this is one of the most popular players

  2. Great article with excellent content found very useful thank you waiting for next blog update.
    Data Analytics Course Online

  3. Awesome article with top quality information and I appreciate the writer's choice for choosing this excellent topic found valuable thank you.
    Data Science Training in Hyderabad

  4. With so many books and articles appearing to usher in the field of making money online and further confusing the reader on the real way to make money.

    Business Analytics Course in Bangalore

  5. I bookmarked your website because this site contains valuable information. I am very satisfied with the quality and the presentation of the articles. Thank you so much for saving great things. I am very grateful for this site.

    Data Analytics Course in Bangalore

  6. I have voiced some of the posts on your website now, and I really like your blogging style. I added it to my list of favorite blogging sites and will be back soon ... PMP Training in Hyderabad

  7. Great article with valuable information found very resourceful and enjoyed reading it waiting for next blog updated thanks for sharing.
    typeerror nonetype object is not subscriptable

  8. Nice Information Your first-class knowledge of this great job can become a suitable foundation for these people. I did some research on the subject and found that almost everyone will agree with your blog.
    Cyber Security Course in Bangalore

  9. Writing in style and getting good compliments on the article is hard enough, to be honest, but you did it so calmly and with such a great feeling and got the job done. This item is owned with style and I give it a nice compliment. Better!
    Cyber Security Training in Bangalore

  10. Fantastic article with informative content. Information shared was valuable and enjoyed reading it looking forward for next blog thank you.
    Ethical Hacking Course in Bangalore

  11. I will very much appreciate the writer's choice for choosing this excellent article suitable for my topic. Here is a detailed description of the topic of the article that helped me the most.
    unindent does not match any outer indentation level

  12. I'm glad I found this blog! Occasionally, students want to know the keys to writing productive literary essays. Your first-class knowledge of this great job can become a suitable foundation for these people. Good
    unindent does not match any outer indentation level python

  13. Really, this article is truly one of the best, information shared was valuable and resourceful Very good work thank you.
    Data Scientist Training in Hyderabad