Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

The Human Element of Cybersecurity

By Mav Turner
Keys to Employee Cybersecurity
May 26, 2015

The security threat landscape is evolving at an alarming rate, with companies of all sizes being impacted. At the same time, security is all too often discussed primarily in the context of threats that come from the outside. True, cybercriminals and other outside threats certainly should be top of mind, but organizations today need to recognize that there are threats within their own four walls, too.

Yes, end users, whether well-meaning or malicious, may get some attention as a potential threat vector, but still not enough heed is given. And it doesn’t end there – though IT departments and the venerable professionals who staff them deserve much credit for not only fighting a tireless battle against myriad threats but also keeping business moving, they themselves can unwittingly become a security vulnerability as well.

What follows is an outline of the top ways end users can pose a threat to the security of their organizations’ infrastructures and how, if not careful, IT professionals can potentially become their own worst enemy as well, together with tips for how IT professionals can mitigate these internal and often overlooked threats.

End Users as Security Vulnerabilities

Unbeknownst to many end users, they can pose a major threat to the security of an organization by falling victim to even simple traps. Human error alone creates a whole school of cybercrime opportunities such as phishing, watering hole attacks and other social engineering tactics. These threats don’t necessarily rely on sophisticated malware or technical vulnerabilities, but rather the psychology and behavior of people. Even without a malicious actor involved, an uneducated or careless employee or an overcomplicated procedure can result in sensitive information leaking and potentially falling into the hands of an attacker.

For IT and enterprise security teams, it can be a (nearly impossible) challenge to manage the daily activities of end users to ensure they aren’t unwittingly sharing sensitive organizational information. The trick is to start somewhere. With that in mind, here are several suggestions: 

  • First and foremost is education.Educating end users on preventative steps they can simply implement on a daily basis to protect personal and company data is a good first step. This includes but isn’t limited to sound advice on password creation, acceptable use of non-company-managed technology (and why certain uses are unacceptable) and how to spot a social engineering attack. In all cases, practical demonstrations will typically work better.
  • Educate, yes, but don’t go it alone.IT should partner with departments such as human resources and finance to help end users understand the impact breaches can have on the business. For example, having the finance department outline the potential costs of a data breach, which in turn impacts the company’s profitability and the end users’ own success, will help drive the message home for end users who may otherwise think they are immune to either the threat of cyberattack or the impact of a breach.
  • Seek to reduce over-complexity and friction. IT professionals should again engage human resources and add executive leadership into the mix to talk about day-to-day processes in the business. Over-complex or convoluted routines are less likely to be adhered to, and the same goes for policies that cause friction with end users. For example, if a lot of end users leverage a public cloud file storage tool like Dropbox – creating a “shadow IT” scenario in the process – it might be better off adopting the platform as an official, and therefore centrally-managed, tool instead of trying to ban access.
  • Get organized and leverage the tools available. It’s imperative that an overall security plan and policies prioritize the end user factor. The overall lifecycle of the end user, including changes that may occur without the use leaving the company, should be considered when devising such policies. For example, when an end user switches roles or departments, they may have access to information that is no longer necessary.
  • Increase monitoring. An organization-wide security monitoring platform compliments anti-malware, data loss prevention and email security tools and allows IT to mitigate the human factor by picking up signs of abnormal and potentially dangerous behavior. It also gives IT a clearer picture of how end users are using applications, the network, systems, etc. That intelligence can then be used to inform how to best educate individuals and improve processes.

The IT Professional and the Increasing Complexities of Modern IT

While end users certainly pose a threat, something likely to be even more overlooked is how the IT department and IT professionals themselves maybe specifically targeted by attackers. As the unsung heroes of business, the IT department is tasked with managing the immense complexities that come with today’s modern IT infrastructure. From BYOD, cloud, virtualization and mobility to name just a few, there’s a great demand placed on IT to manage a host of new technologies with limited resources and budget. Further complicating their jobs is that with these new technologies and the increase of telecommuting, businesses truly no longer have four distinct walls – they’ve become porous, open and available anywhere, anytime.

With this great demand on modern IT professionals in mind, it’s easier to understand how, try as they may to avoid it, mistakes happen. The point is that the complexities of modern IT make the likelihood of simple mistakes by IT professionals made in the course of managing today’s infrastructures much higher, and those simple mistakes can have security ramifications. What can be done? Here are a few tips:

  • Simplify IT management, including security management, to reduce the likelihood of mistakes. There’s really no way to get around the increasing complexity of today’s infrastructures; however, using the right tools – such as network, server, application and database monitoring; virtualization, cloud and configuration management; and remote support and help desk software – to simplify their day-to-day management can help prevent mistakes from happening by providing necessary performance information, enabling simple issue remediation and through automation. Tools such as patch management and security information and event management (SIEM) also help to simplify the process of managing the security of infrastructures specifically.
  • Watch the watchers. To prevent the accidental mismanagement of potentially sensitive data, IT departments should monitor activity that takes place by administrator accounts differently than they watch end users, and regularly audit how administrator accounts are being used. Through the auditing process, businesses can ensure sensitive data remains in the right hands.
  • Trust outsiders only enough. IT departments should be cautious in what access and privileges they give contractors and third-party IT service providers, being careful not to mistakenly place too much trust in them. It should be clear what their scope is; they should be monitored extensively; and, if possible, they should be given only limited remote access.
  • Apply the principle of least privilege. Like for everyone else, IT professionals should also assign themselves low-credentialed accounts for day-to-day work, avoiding global administrator privileges except when absolutely necessary.

By following these best practices IT professionals can make a tremendous impact on the security of their organizations’ infrastructures. With the pace the threat landscape is evolving and growing, this is no longer a nice-to-have, but a necessity.

KEYWORDS: cyber security education phishing threats social engineering

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mav Turner is the director of SolarWinds’ security portfolio. He has worked in IT management for over 14 years, including roles in both network and systems management prior joining SolarWinds in 2009.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Glowing blue fibers in darkness

    Verizon 2024 Data Breach Report shows the risk of the human element

    See More
  • human-security-freepik1170x658.jpg

    The importance of the human element of security

    See More
  • facialrecognition

    In the Age of Facial Recognition, The Human Element is Still Necessary

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!