{"id":5435,"date":"2018-05-16T16:57:45","date_gmt":"2018-05-16T23:57:45","guid":{"rendered":"http:\/\/clikcloud.com\/?p=4973"},"modified":"2018-05-16T17:58:26","modified_gmt":"2018-05-17T00:58:26","slug":"the-human-side-of-network-security","status":"publish","type":"post","link":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/","title":{"rendered":"The Human Side of Network Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As Technology grows, so does the complexity of threats to your network&#8211;hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network\u2019s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to a CompTIA <\/span><a href=\"https:\/\/www.comptia.org\/resources\/building-a-culture-of-cybersecurity-a-guide-for-corporate-executives-and-board-members\"><span style=\"font-weight: 400;\">white paper<\/span><\/a><span style=\"font-weight: 400;\">, network security was a key issue on the minds of business owners coming into 2018. Cybercrime damages are expected to reach $6 trillion annually in the next few years. Keeping malware and antivirus definitions up to date, and having OS patches ready is necessary, of course. And so is data encryption. But don\u2019t overlook the human element. Human error is implicated in more than half of all data breaches, more than technological error. The education and training of employees plays an important part in keeping your network secure.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">A Culture of Security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As important as technology tools are, the human element is even more so. When a data breach occurs, human error is at fault more than 50% of the time. So what can you do to train your employees? Part of the solution starts at the top. Managers need to adopt a strong security orientation for the entire company, educating all employees in how to recognize potential threats&#8211;phishing schemes, for example&#8211;and to report these threats. They need to keep up with the dangers related to social media and unsecured \u201chotspots.\u201d Also, they need to be told about the establishment and management of strong passwords and data encryption. Should a data breach occur, employees need to know the processes for reporting and responding to the problem, even escalating to management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your company\u2019s network is only as secure as its weakest link&#8211;don\u2019t let that weak link be your human capital. For an evaluation of your risks and guidance in educating your employees, contact your Network Expert today.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Technology grows, so does the complexity of threats to your network&#8211;hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network&rsquo;s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital.<\/p>\n","protected":false},"author":1,"featured_media":5376,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[183,5,100],"tags":[168],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Human Side of Network Security<\/title>\n<meta name=\"description\" content=\"As Technology grows, so does the complexity of threats to your network--hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network&rsquo;s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"clikcloud\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/\",\"name\":\"The Human Side of Network Security\",\"isPartOf\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\"},\"datePublished\":\"2018-05-16T23:57:45+00:00\",\"dateModified\":\"2018-05-17T00:58:26+00:00\",\"author\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\"},\"description\":\"As Technology grows, so does the complexity of threats to your network--hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network&rsquo;s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital.\",\"breadcrumb\":{\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/clikcloud.net\/3gtelco\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Human Side of Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#website\",\"url\":\"https:\/\/clikcloud.net\/3gtelco\/\",\"name\":\"3G Master (3gtelco)\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92\",\"name\":\"clikcloud\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g\",\"caption\":\"clikcloud\"},\"sameAs\":[\"http:\/\/www.clikcloud.com\"],\"url\":\"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Human Side of Network Security","description":"As Technology grows, so does the complexity of threats to your network--hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network&rsquo;s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/","twitter_misc":{"Written by":"clikcloud","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/","url":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/","name":"The Human Side of Network Security","isPartOf":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#website"},"datePublished":"2018-05-16T23:57:45+00:00","dateModified":"2018-05-17T00:58:26+00:00","author":{"@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92"},"description":"As Technology grows, so does the complexity of threats to your network--hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff, all these pose risks to your network&rsquo;s security. Your network is only as strong as its weakest link. And sometimes, that weak link is your human capital.","breadcrumb":{"@id":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/clikcloud.net\/3gtelco\/the-human-side-of-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clikcloud.net\/3gtelco\/"},{"@type":"ListItem","position":2,"name":"The Human Side of Network Security"}]},{"@type":"WebSite","@id":"https:\/\/clikcloud.net\/3gtelco\/#website","url":"https:\/\/clikcloud.net\/3gtelco\/","name":"3G Master (3gtelco)","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clikcloud.net\/3gtelco\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/34b2d47698492f87857e237940086a92","name":"clikcloud","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/clikcloud.net\/3gtelco\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a11d314869c4014ce5fd713e3ff003a?s=96&d=mm&r=g","caption":"clikcloud"},"sameAs":["http:\/\/www.clikcloud.com"],"url":"https:\/\/clikcloud.net\/3gtelco\/author\/clikcloud\/"}]}},"_links":{"self":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5435"}],"collection":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/comments?post=5435"}],"version-history":[{"count":1,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5435\/revisions"}],"predecessor-version":[{"id":5436,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/posts\/5435\/revisions\/5436"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media\/5376"}],"wp:attachment":[{"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/media?parent=5435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/categories?post=5435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clikcloud.net\/3gtelco\/wp-json\/wp\/v2\/tags?post=5435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}