The Emergence of the Human Firewall

When the causes of cybercrime incidents are investigated, the same underlying reason crops up time and time again … Human Error.

Over the years, levels of IT security and threat detection have advanced, and cyber criminals have realised that the weakest point in any defence system is the human element … the zone of emotion where personalities and individual frailties can be exploited.

A wide-reaching global survey by IBM into the causes of corporate cyber violations in over 130 countries found that human error was a major contributing factor in 95% of all breaches, and similar studies have come to the same conclusions. The stark reality shows that if the human error had not occurred, 19 out of 20 incidents would have been avoided.

In our complex and busy business lives, unintentional actions, and failures to follow instructions are at the heart of most security incidents, and everyone makes mistakes at one time or another, it’s part of the human psyche.

The most common human errors and causes of breaches include the failure to install software security updates, poor password discipline, and carelessly falling victim to email and message phishing attacks by clicking on malicious attachments, or taking some form of prompted action.

Attacks that prompt employees to unwittingly click on a link, or make online payments to an organisation after receiving spoofed instructions, cannot be protected by technology.

Workplace advancements and the growth in hybrid working practices mean that we have an increasingly complex working environment. Multiple business applications that are accessed anywhere and from any device all require usernames and passwords. The desire to take operational shortcuts and to simplify and replicate behaviours is a human instinct that’s underpinned by the notion that it will never happen to me.

Cybercriminals understand the pressures of modern life, and they use social engineering techniques to pressure and influence us to take action. Even though the news, current affairs programmes and social media constantly make us aware of new scams and techniques, the number of incidents grows daily.

As human error is so closely associated with the majority of cyber breaches, mitigation of such risks to minimise the likelihood of an incident should be a key focus area, and building employee awareness and training into a unified security and business continuity service provides far greater protection than any single technical solution.

Additionally, addressing the human issue has the added advantage of empowering the workforce to pro-actively identify and report potential threats and anomalies as they occur. And with such compelling evidence that employee mistakes are so prevalent in successful cyber-attacks, upskilling the workforce should be an integral part of a wider security focus.

Our cyber security and protection services provide a laser-beam focus on current and developing threats, and we partner with Mimecast, Trustwave and Cisco to provide world leading security services. When considering education, we have a broad range of education services available from web based content to continuous development, CxO to the general workforce, and core skills to regulatory and compliance education services.

Our unique, tried and tested methodology focuses on the main areas of human vulnerability and shows the workforce why they should care. Employee adoption rates are high and on-going learning creates lasting and meaningful behavioural changes across organisations.

Taking just a few minutes of employee time each month, will make significant improvements to employee awareness and preparedness - radically changing behaviours and lowering the risk of an attack.

Related articles

940X529 People at work 2

Helping businesses focus on what’s important

Michael O'Donnell shares some examples of how he has recently provided customers with a the right technology solution for their business.

767X575 Technology focus 3

Immutable S3 Data Storage – What’s all the Fuss About?

Malcolm shares how S3 storage and backup offers significant additional value, particularly where data immutability (tamper proof protection) is embedded within the solution.

767X575 Technology focus 1

Datacentre Security Standards

Both digital and physical datacentre security procedures must be in place by all organisations running infrastructure that uses and stores sensitive and private data. Here we discuss some of the security standards that should be in place.

Contact us to find out how we can help you
and your business today

Contact us

Further Insights

940X529 People at work 2

Helping businesses focus on what’s important

Michael O'Donnell shares some examples of how he has recently provided customers with a the right technology solution for their business.

767X575 Working from home 2

Helping the Bailiwick’s businesses to excel through tech

Fern Hill shares some examples of how we have made life easier for our customers through the right technology.

767X575 Technology focus 3

Immutable S3 Data Storage – What’s all the Fuss About?

Malcolm shares how S3 storage and backup offers significant additional value, particularly where data immutability (tamper proof protection) is embedded within the solution.