Humans are the weakest link in cyber security!

How to build a strategic defence against human error across your organisation

We have always heard this often-repeated cliché: Humans are the weakest link in cybersecurity.

Solutions to this often centre on the three pillars of cybersecurity (people, process, technology) and persuade you as to why people are the weakest link. 

This article from Bitdefender builds on that concept to form a more strategic defence against human error. To do so, they build on commonly presented solutions that typically focus on educating users and enhancing their abilities to avoid attacks exploiting human psychology (social engineering). In other words, instead of solely aiming and hoping that the weakest link (humans) is never exploited it's time for a rethink.

Related Articles
Cyber Security Why small cracks can lead to big payouts
Why small cracks can lead to big payouts

The latest threat intelligence and actionable insights

Cyber Security How clear is your security posture and journey?
How clear is your security posture and journey?

Assess, analyse and leverage data to protect and secure infrastructure

Cyber Security Ransomware: To pay or not to pay, that is the question
Ransomware: To pay or not to pay, that is the question

Things to consider if you are a victim of a ransomware attack

Cyber Security The "why" of AI-driven security
The "why" of AI-driven security

What it can actually do for SOCs and the wider business

Cyber Security The convergence of security & fraud
The convergence of security & fraud

How traditional silos can be a threat - and how to prevent it

Cyber Security SIEM buyer's guide for the modern SOC
SIEM buyer's guide for the modern SOC

Key considerations when selecting your SIEM solution

Cyber Security Are you ready for NIS2?
Are you ready for NIS2?

Reduce the risks to critical infrastructure whilst maintaining customer data confidentiality

Cyber Security Get an attacker’s view into your organisation
Cyber Security Ransomware readiness for SMBs
Ransomware readiness for SMBs

Prepare for the rising threat of RaaS, initial access brokers, and credential theft

Modern Workplace The convergence of security & fraud
The convergence of security & fraud

Don't let a lack of communication gives fraudsters the advantage

Cyber Security Wearing multiple hats?
Wearing multiple hats?

Here's 6 ways to become a cyber guardian!

Cyber Security The art of networking
The art of networking

Top 10 tips to get the most from networking events

Cyber Security Global Threat Intelligence Report: March 2024 Edition
Global Threat Intelligence Report: March 2024 Edition

Actionable and contextualised intelligence from Blackberry to increase your cyber resilience.

Cyber Security SMB cybersecurity tips
SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Fortify your tech stack
Fortify your tech stack

Game-changing cybersecurity defence strategies.

Cyber Security 5 reasons to join SWCRC
5 reasons to join SWCRC

Get your FREE police-backed cyber security advice for SMBs.

Cyber Security February's three top tips to secure your business
February's three top tips to secure your business

This month's expert guidance from the police-backed South West Cyber Resilience Centre.

Cyber Security Threat hunting in multi-cloud environments
Threat hunting in multi-cloud environments

How to deploy a comprehensive multi-cloud threat hunting strategy.

Cyber Security 5 expert security predictions for 2024
5 expert security predictions for 2024

Barracuda executives give their inside take on the year ahead.

Cyber Security Cyber exposures - an insurers' perspective
Cyber exposures - an insurers' perspective

An expert's view on the state of cyber risk.

Cyber Security January's three top SMB cybersecurity tips
January's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Ready for the worst?
Ready for the worst?

Prepare for the worst in the event of a cyber attack: Customise your incident response plan

Cyber Security December's three top SMB cybersecurity tips
December's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Latest Threat Report
Latest Threat Report

70% increase in unique malware among other threats

Cyber Security November's three top SMB cybersecurity tips
November's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Three steps to mitigate cyber attacks
Three steps to mitigate cyber attacks

Prevention is better than cure with ransomware attacks

Cyber Security October's three top SMB cybersecurity tips
October's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security September's three top SMB cybersecurity tips
September's three top SMB cybersecurity tips

Monthly expert guidance from the South West Cyber Resilience Centre.

Cyber Security Zero-day: How to close data vulnerabilities
Cyber Security ChatGPT and the security of your business
ChatGPT and the security of your business

How can cybersecurity and IT operations leaders adjust? Find out in this live webinar

Cyber Security Continuous controls, compliance and risk mitigation
Cyber Security Powering Cybersecurity with Mastercard
Powering Cybersecurity with Mastercard

Mastercard cybersecurity solutions protect the people, transactions and devices that power businesses

Cyber Security Risk and reward in Power Platform
Risk and reward in Power Platform

The top three security risks that could be lurking in Power Platform.

Cyber Security The "other" purpose of a cyber security strategy
The "other" purpose of a cyber security strategy

Best practices: Improve your business cyber defenses for cyber insurability

Cyber Security A cross-NIST approach to cyber security
A cross-NIST approach to cyber security

Expert ransomware market insights for 2023

Cloud Security Microsoft Secure Live
Microsoft Secure Live

Explore the most comprehensive, industry-leading solutions to help you protect everything.

Cyber Security Improve your security posture - in 1 minute
Improve your security posture - in 1 minute

How a web application firewall helps.

Modern Workplace Using data to justify M365 investment
Using data to justify M365 investment

Join a live webinar on 23 February to see how to use data to prove value and bolster performance.

Cyber Security Understand the current cyberthreat landscape
Understand the current cyberthreat landscape

Security tips you can put into action today.

Cyber Security The outlook for cybersecurity and privacy in 2023
The outlook for cybersecurity and privacy in 2023

Six key trends to look out for - and adapt.

Cyber Security Cyber attacks becoming "uninsurable"
Cyber attacks becoming "uninsurable"

Zurich CEO issues warning.

Cyber Security Why cybercriminals love your SME
Why cybercriminals love your SME

With 2/5 of UK SMEs being hit, what's the attraction?

Cyber Security Are your cyber defences built on sand?
Are your cyber defences built on sand?

How Acronis helps manage a constantly evolving threat landscape.

Cyber Security While football might be coming home, keep cyber attacks away!
While football might be coming home, keep cyber attacks away!

Keeping users safe from heightened threats.

Cyber Security Your Google Workspace and Microsoft 365 data is at risk
Your Google Workspace and Microsoft 365 data is at risk

Protect it against ransomware and other threats.

Cyber Security Ransomware attacks: 'when' not 'if'
Ransomware attacks: 'when' not 'if'

Are you properly prepared for the worst?

Cyber Security Why are small business or charities hit?
Why are small business or charities hit?

Smaller companies can be softer targets

Cyber Security FREE cyber insurance for your business
FREE cyber insurance for your business

£25,000 cover with Cyber Essentials

Cyber Security 14 questions to assess software risk
14 questions to assess software risk

Implementing a framework-based mindset

Cyber Security 5 fundamentals of cyber security
5 fundamentals of cyber security

Identify your risks and vulnerabilities

Cyber Security Building cyber resilience in 2024
Building cyber resilience in 2024

Essential viewing to protect yourself from cyber crime this year

Cyber Security SWCRC Cyber Resilience Community
SWCRC Cyber Resilience Community

Supported by the Home Office, Policing and Ambassador partners

Share this story

  Have you seen...
  1. Human Security The Convergence of Security & Fraud
  2. Elastic The "why" of AI-driven security
  3. Elastic SIEM buyer's guide for the modern SOC
  4. How clear is your security posture and journey?
  5. Why Small Cracks can Lead to Big Payouts
  6. Are you ready for NIS2?
  7. Get an attacker’s view into your organisation
  8. Ransomware readiness for SMBs
  9. The Convergence of Security & Fraud
  10. Strategic Defence Against Human Error in Cybersecurity
  11. The Art of Networking
  12. Global Threat Intelligence Report March 2024 Edition
  13. SWCRC Cyber Resilience Community
  14. Game-Changing Cybersecurity Defence Strategies
  15. Threat hunting in multi cloud environments
  16. 5 security predictions for 2024
  17. Cyber exposures - an insurers' perspective
  18. Are you ready with an incident response plan?
  19. November 2023 Threat Report
  20. Three steps to mitigate cyber attacks
  21. Zero-day: How to close data vulnerabilities
  22. Continuous controls, compliance and risk mitigation. CyberCatch have it covered!
  23. The "other" purpose of a cyber security strategy
  24. ChatGPT and the security of your business
  25. Powering Cybersecurity with Mastercard
  26. Risk and reward in Power Platform
  27. A cross-NIST approach to cyber security
  28. Improve your security posture - in 1 minute
  29. Microsoft Secure virtual event
  30. Understand the current cyberthreat landscape
  31. How to justify your Microsoft 365 investment
  32. Cyber attacks becoming "uninsurable"
  33. The outlook for cybersecurity and privacy in 2023
  34. 14 questions to assess your software vendor supply-chain risk
  35. Are your cyber defences built on sand?
  36. Your Google Workspace and Microsoft 365 data is at risk
  37. While football might be coming home, keep cyber attacks away!
  38. Ransomware attacks: 'when' not 'if'
Rate the Article

Click the link below to rate this article

Rate this article

We're a community where IT security buyers can engage on their own terms.

We help you to better understand the security challenges associated with digital business and how to address them, so your company remains safe and secure.

Interested in what you see? Get in touch, and let's start a conversation Get in touch