Modern Australian
Men's Weekly

.

Human error is the weakest link in the cyber security chain. Here are 3 ways to fix it

  • Written by Jongkil Jay Jeong, Senior Research Fellow in the School of Computing and Information System, The University of Melbourne
Human error is the weakest link in the cyber security chain. Here are 3 ways to fix it

Despite huge advances in cyber security, one weakness continues to overshadow all others: human error.

Research has consistently shown human error is responsible for an overwhelming majority of successful cyber attacks. A recent report puts the figure at 68%.

No matter how advanced our technological defences become, the human element is likely to remain the weakest link in the cyber security chain. This weakness affects everyone using digital devices, yet traditional cyber education and awareness programs – and even new, forward-looking laws – fail to adequately address it.

So, how can we deal with human-centric cyber security related challenges?

Understanding human error

There are two types of human error in the context of cyber security.

The first is skills-based errors. These occur when people are doing routine things – especially when their attention is diverted.

For example, you might forget to back up desktop data from your computer. You know you should do it and know how to do it (because you have done it before). But because you need to get home early, forgot when you did it last or had lots of emails to respond to, you don’t. This may make you more exposed to a hacker’s demands in the event of a cyber attack, as there are no alternatives to retrieve the original data.

The second type is knowledge-based errors. These occur when someone with less experience makes cyber security mistakes because they lack important knowledge or don’t follow specific rules.

For example, you might click on a link in an email from an unknown contact, even if you don’t know what will happen. This could lead to you being hacked and losing your money and data, as the link might contain dangerous malware.

Person holding a mobile phone with a speech bubble containing a suspicious message and link.
Many cyber attacks are successful because people click on unknown links in emails and text messages. ParinPix/Shutterstock

Traditional approaches fall short

Organisations and governments have invested heavily in cyber security education programs to address human error. However, these programs have had mixed results at best.

This is partly because many programs take a technology-centric, one-size-fits-all approach. They often focus on specific technical aspects, such as improving password hygiene or implementing multi-factor authentication. Yet, they don’t address the underlying psychological and behavioural issues that influence people’s actions.

The reality is that changing human behaviour is far more complex than simply providing information or mandating certain practices. This is especially true in the context of cyber security.

Public health campaigns such as the “Slip, Slop, Slap” sun safety initiative in Australia and New Zealand illustrate what works.

Since this campaign started four decades ago, melanoma cases in both countries have fallen significantly. Behavioural change requires ongoing investment into promoting awareness.

The same principle applies to cyber security education. Just because people know best practices doesn’t mean they will consistently apply them – especially when faced with competing priorities or time pressures.

New laws fall short

The Australian government’s proposed cyber security law focuses on several key areas, including:

  • combating ransomware attacks
  • enhancing information sharing between businesses and government agencies
  • strengthening data protection in critical infrastructure sectors, such as energy, transport and communications
  • expanding investigative powers for cyber incidents
  • introducing minimum security standards for smart devices.
Man wearing navy suit with patterned navy tie talking in parliament. Earlier this month the minister for cyber security Tony Burke introduced new cyber security laws. Mick Tsikas/AAP

These measures are crucial. However, like traditional cyber security education programs, they primarily address technical and procedural aspects of cyber security.

The United States is taking a different approach. Its Federal Cybersecurity Research and Development Strategic Plan includes “human-centred cybersecurity” as its first and most important priority.

The plan says

A greater emphasis is needed on human-centered approaches to cybersecurity where people’s needs, motivations, behaviours, and abilities are at the forefront of determining the design, operation, and security of information technology systems.

3 rules for human-centric cyber security

So, how can we adequately address the issue of human error in cyber security? Here are three key strategies based on the latest research.

  1. Minimise cognitive load. Cyber security practices should be designed to be as intuitive and effortless as possible. Training programs should focus on simplifying complex concepts and integrating security practices seamlessly into daily workflows.

  2. Foster a positive cyber security attitude. Instead of relying on fear tactics, education should emphasise the positive outcomes of good cyber security practices. This approach can help motivate people to improve their cyber security behaviours.

  3. Adopt a long-term perspective. Changing attitudes and behaviours is not a single event but a continuous process. Cyber security education should be ongoing, with regular updates to address evolving threats.

Ultimately, creating a truly secure digital environment requires a holistic approach. It needs to combine robust technology, sound policies, and, most importantly, ensuring people are well-educated and security conscious.

If we can better understand what’s behind human error, we can design more effective training programs and security practices that work with, rather than against, human nature.

Authors: Jongkil Jay Jeong, Senior Research Fellow in the School of Computing and Information System, The University of Melbourne

Read more https://theconversation.com/human-error-is-the-weakest-link-in-the-cyber-security-chain-here-are-3-ways-to-fix-it-241459

How Natural Pearls Shaped Trade Routes and Global Economies

Throughout history, natural pearls—those rare, untamed treasures formed by nature itself—have exerted a powerful influence on trade networks, po...

How To Choose The Right Insulation For Your Space

Selecting the appropriate insulation for your home or building is a critical decision that affects comfort, energy efficiency, and present and future ...

7 Best Things to Do in Beaufort, Victoria

Beaufort is a charming small town in Victoria’s Goldfields, full of history, natural beauty, and warm, welcoming locals. Whether you’re passing th...

What to Expect During Divorce Mediation & Settlement

Divorce can be a difficult and emotionally draining process, but mediation and settlement often provide a constructive path forward. Instead of goin...

Navigating Disability Services in Perth: Your Questions Answered

Understanding the landscape of disability support can feel overwhelming, especially when you're just starting out. If you’re looking for support a...

How Veneers and Dental Implants Work Together for Full Smile Restoration

Modern dentistry has strong instruments that can produce life-changing outcomes when it comes to repairing a smile that has been impacted by tooth los...

Gen Z’s Are Going off Grid – But Is It Sustainable?

Australia’s cost of living crisis is causing Gen Z to get creative with frugal living options. Earlier this year, young couple Koby and Amelie wan...

The Risks of DIY Air Conditioning Installation and How to Avoid Them

Air conditioning is essential in Australia, especially during the scorching summer months, when homes and workplaces can become unbearable without rel...

How to Find Reliable Air Conditioning Services Near You in Brisbane Northside

Introduction In Brisbane’s hot and humid climate, air conditioning has become more of a necessity than a luxury. Whether it's keeping your home coo...

Enhance Outdoor Living with Lifestyle Awnings

Creating the perfect balance between indoor comfort and outdoor living is something many homeowners aspire to achieve. In recent years, Lifestyle Aw...

Why Buckets with Lids Are Essential for Safe Storage & Transportation

The right bucket can streamline transport and make handling easier day to day. With options suited to food, chemicals and construction materials, th...

Comfort and Style with Ceiling Fans Perth

While air conditioning is common, it is not always the most cost-effective or sustainable solution, particularly during long hot summers. For homeow...

How Professional Air Conditioning Services Improve Comfort and Efficiency

Air conditioning has become a fundamental part of homes and businesses, providing relief from sweltering summers and keeping interiors warm in winte...

The Value of Professional Rubbish Removal Services

From everyday waste to bulky items like furniture and appliances, finding the right way to dispose of rubbish is not always straightforward. This is...

Why Ugly Websites Sometimes Outperform Beautiful Ones

In the digital age, we're constantly told that first impressions matter, and nowhere does this seem more apparent than in web design. However, a cur...

TPD Claims & Super: What Does It All Mean?

Many Australians hear the term "TPD" in relation to their superannuation and feel completely lost. If you're scratching your head, wondering what it...

What Does Breastfeeding Feel Like? A Guide for New Moms

Frequently, numerous new mothers wonder, "What does breastfeeding feel like?" The feeling is different for each individual - a few describe it as a ...

Best Nail Care Routine for Frequent Nail Polish Wearers

For many people, nail polish is more than a beauty statement – it’s part of their everyday routine. Whether you love bold colours, chic neutrals...