CYBERS #1 VULNERABILITY IS YOU!
According
to a recent study by IBM, human error is the main cause of 95% of all cyber
security breaches (Ahola, 2019). If human error were somehow eliminated from
the equation, 19 out of 20 data breaches may not happen at all! Human error can
occur in various ways that include but are not limited to: weak passwords, out
of date software and patches, and falling victim to phishing attacks (Hacker
News, 2021). The list of cyber-attacks and data breaches caused by human error
is astronomical and would be nearly impossible to document every single breach caused
by human error.
One
example is in 2018, the Department of Defense (DOD) sent out an unencrypted email
via their Defense Travel System (DTS) to the wrong distribution list. In this
email, there was the personal identification of approximately 21,500 Marines,
sailors, and civilians, including their personal bank account numbers,
truncated social security numbers, and emergency contact information (Bisson,
2020). Not only did this data breach violate the personal information of
thousands of people but could also be considered a national security risk.
Because
human error has been and will continue to be the biggest weakness in cyber
security, organizations must thoroughly protect against it. Human error means
the unintentional – or lack of action – by employees and users that cause,
spread, or allow a security breach to take place (Ahola, 2019). There are two
types of human errors: skill-based and decision-based errors. Skill-based error
includes slips and lapses in judgement when performing familiar tasks; this is
due to lapse of judgement, mistake, or simple negligence. Decision-based errors
occur when the users make a faulty decision, this can be due to lack of
knowledge, or not realizing they are making a bad decision through their
inaction (Ahola, 2019).
When
making a plan for enterprise security architecture, human error should be a
main area to establish controls over to help prevent these types of breaches. Security
awareness and training will help educate the users on common mistakes that can
and do occur due to lack of security awareness knowledge. However, it doesn’t
do nearly enough to protect against these types of errors. Security controls
must be put in place to prevent human error from occurring (EKU Online, 2018). Some
of these additional security controls include:
Multifactor
identification and authentication management – This requires more than one
single point of authentication when accessing system resources, applies the least
privilege rule when granting access to system resources, and can include adding
additional authentication requirements such as biometrics.
Network
Management – Understanding the network topology, what technologies the network
uses, and how security can be applied at the network level to keep hackers from
gaining access to system resources.
System
Monitoring and Surveillance – This includes identifying breaches quickly and
accurately so that they can be contained. This is achieved by both machine and
human interaction; machines collect the data and humans analyze it to determine
the risk.
Breach
Detection – This step occurs unfortunately after the breach has occurred but
with quick detection, the impacts can be minimized. There is breach detection
software that identifies odd behavior that could be a sign of a data breach.
Encryption
– If proper encryption is used by an organization, hackers cannot insert
themselves between email servers to intercept and read email. In the event of a
data breach, encryption can also make stolen or compromised data unreadable.
Unfortunately
when humans are involved, there is always a chance for human error. These
chances can be greatly reduced by proper and frequent user training, and implementing
system controls that limit the amount of damage that can be done. These
mitigation strategies need to be analyzed and worked into the enterprise
security architecture to help protect organizations from the largest cyber
security threat out there… you!
References
Ahola, M. (2019, April). The
role of human error in successful cyber security breaches. usecure Blog.
Retrieved March 7, 2022, from
https://blog.usecure.io/the-role-of-human-error-in-successful-cyber-security-breaches
Bisson, D. (2020, October
15). 7 data breaches caused by human error: Did encryption play a role? Venafi.
Retrieved March 7, 2022, from
https://www.venafi.com/blog/7-data-breaches-caused-human-error-did-encryption-play-role
How to reduce human error and
increase information security. EKU Online. (2018, November 29). Retrieved March
7, 2022, from
https://safetymanagement.eku.edu/blog/how-to-reduce-human-error-and-increase-information-security/#:~:text=The%20first%20way%20is%20to,criminals%20bent%20on%20breaching%20security.
Why human error is #1 cyber
security threat to businesses in 2021. The Hacker News. (2021, February 4).
Retrieved March 7, 2022, from
https://thehackernews.com/2021/02/why-human-error-is-1-cyber-security.html
Comments
Post a Comment