Remove turn-your-weakest-link-into-a-human-firewall
article thumbnail

Turn Your “Weakest Link” Into a “Human Firewall”

GovLoop

It’s typical to think of the workforce as cybersecurity’s weakest link. That makes sense: According to a recent report, 82% of breaches across all industries involved human factors — stolen credentials, phishing, misuse or simple error. An alternative approach transforms users into “ a human firewall.”

article thumbnail

Turn Your “Weakest Link” into a “Human Firewall”

GovLoop

It’s typical to think of the workforce as cybersecurity’s weakest link. That makes sense: According to a recent report, 82% of breaches across all industries involved human factors — stolen credentials, phishing, misuse or simple error. An alternative approach transforms users into “ a human firewall.”