1 / 9

Human Error in Cyber Security Breaches | Cyberroot Risk Advisory

Cyberroot Risk Advisory

Download Presentation

Human Error in Cyber Security Breaches | Cyberroot Risk Advisory

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. HUMAN ERROR In CYBER SECURITY BREACHES Cyberroot Risk Advisory

  2. There isn't a single person on the planet that is perfect. In reality, learning and growing via errors is an essential aspect of the human experience. However, in terms of cyber security, human error is much too frequently disregarded. When it comes to cybersecurity, human error is to blame for either inadvertent or inaction-related data breaches. It includes actions like installing malicious software, using a weak password, giving out your IP address so it can be checked, and not updating your software. Why then do human errors lead to so many breaches, and why do current solutions not adequately address them? Let's look at the history of human mistakes and what you can do to encourage better online behavior among your employees.

  3. Email Misdelivery Email delivery failures were the seventh most frequent reason for cybersecurity breaches in 2018. More recently, 58% of workers acknowledged sending the wrong person at work an email. Aside from being embarrassing, misdirected emails could result in data theft or loss. Customers must be notified of any breaches involving their personal information if it pertains to them; failing to do so could result in a loss of trust, harm to the relationship, or even the termination of a contract. Companies that are subject to the GDPR and other privacy regulations are also expected to notify the regulators when there has been a data breach. Failure to do so could result in significant fines, legal penalties, or other punitive steps.

  4. Poor Password Hygiene Passwords are frequently the first line of defense for cybersecurity in businesses. However, they frequently serve as the greatest weakness. In actuality, stolen or compromised user credentials account for 61% of breaches. Passwords are among the most frequent human errors in cybersecurity breaches for the following reasons: Most people employ standard passwords like 123456 or password. 4/5 people use the same password for their primary email account on other websites Many people keep using the same passwords for a long time. Some people record their passwords or divulge them to coworkers.

  5. These types of errors make it simple for criminals to obtain passwords and gain access to the victim's PC or even the company network. Furthermore, stolen passwords frequently end up on the Dark Web, where their value varies according to the user and their level of access.

  6. Inadequate Patching Software flaws are exploited by cybercriminals to access corporate networks, systems, and data. When such vulnerabilities are found, the software sellers or developers close the hole and distribute a patch to all users. To stop breaches, an emergency fix is required. A delay frequently occurs, giving attackers the opportunity to compromise systems and take data.

  7. Poor Access Control Another significant human error in cybersecurity breaches is inadequate access control, which enables malicious actors to take over corporate networks. Security teams must concentrate on both error prevention and mitigation because cyber attacks are now all but unavoidable. Access control is crucial in this situation, especially if the "least privileged principle" is used (LPP). Users only have the bare minimum access necessary to carry out their duty with LPP. Giving users access they don't require increases the threat attack surface. This is avoided via LPP, which also lowers the likelihood of a breach.

  8. HOW TO REDUCE HUMAN ERROR?

  9. Adopt a Zero Trust strategy for cybersecurity. To improve password-based security, use two-factor authentication and biometric security. To generate and securely store strong passwords, use encrypted password managers. Install machine-learning security tools to automatically warn users of potential dangers. To identify and fix software security flaws, do routine application security testing. Establish a culture where security is prioritized and considered in all decisions, procedures, and workflows.

More Related