{"id":1858,"date":"2006-04-12T00:00:00","date_gmt":"2006-04-12T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/12\/man-still-the-weakest-link\/"},"modified":"2021-12-30T11:40:09","modified_gmt":"2021-12-30T11:40:09","slug":"man-still-the-weakest-link","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/12\/man-still-the-weakest-link\/","title":{"rendered":"Man still the weakest link"},"content":{"rendered":"<p>Human error was responsible for nearly 60 percent of information security breaches last year, a new study has found.  &#8220;The primary cause of security breaches&#8211;human error&#8211;is not being adequately addressed,&#8221; Brian McCarthy, chief operating officer of CompTIA, said in a statement. &#8220;The person behind the PC continues to be the primary area where weaknesses are exposed.&#8221;  Despite the prominent role that human behavior plays in information security breaches, just 29 percent of the 574 organizations worldwide that participated in the survey said security training is a must for employees. Only 36 percent of organizations offer security awareness training, the study found.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CompTIA also noted that in the last several years, organizations have equipped themselves with sophisticated security infrastructure that better detect and prevent attacks.<\/p>\n<p>The study found that 96 percent of respondents use antivirus software while 91 percent have firewalls and proxy servers, in addition to disaster recovery plans, intrusion detection systems and information security policies.<\/p>\n<p>http:\/\/www.zdnetasia.com\/news\/security\/0,39044215,39350700,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1858","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1858"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1858\/revisions"}],"predecessor-version":[{"id":4345,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1858\/revisions\/4345"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}