Skip to main content

                                                       

ERRARE HUMANUM EST


 The Inescapable Nature of Human Error and Its Implications in Cybersecurity

To err is human; one could even say it is a defining characteristic of humanity. Who has never made a mistake, whether out of distraction, ignorance, or because it was provoked?

No one is immune to making mistakes, and most of the time, they are forgivable, even if their consequences can be very damaging.

However, the fundamental, unforgivable error is doing nothing to avoid situations that lead to mistakes.

Thus, to minimize errors due to distraction, one should avoid multitasking (for example, a surgeon operating should not be distracted by a nurse recounting her latest adventures) and refrain from performing actions mechanically. As for errors committed out of ignorance, it is best to educate oneself before making a decision (in matters of justice, this problem is addressed by the maxim that no one can ignore the law). In the case of an error intentionally provoked by a third party, the best advice is to always think before acting and leave the "I act, then I think" approach to politicians.

No activity involving humans is immune to the consequences of the errors they might make.

This is especially true in the field of cybersecurity.

However, one must not confuse the error with its consequences, as I recently read in an article by Arnaud De Backer1, who writes that "In the field of cybersecurity, human error refers to security breaches and data leaks that result from human actions and decisions."

All cybersecurity professionals will tell you that humans are the weak link in cybersecurity because they are not immune to making mistakes, regardless of their level of education or preparation: Zero risk does not exist.

Of course, we should not reject everything the specialized literature tells us about internet user education, but we must ask ourselves if we are fighting the wrong battle by striving at all costs to prevent human error rather than focusing on limiting its consequences.

It is based on these reflections that PT SYDECO created its ARCHANGEL© 2.0 INTEGRATED DEFENSE SYSTEM, which aims not only to protect industrial or information systems from direct and indirect cyberattacks but also to prevent human error from having the same negative effects on the system, or at least to minimize its consequences as much as possible.

ARCHANGEL© 2.0, a next-generation firewall, was designed by integrating the ZERO TRUST rule into its protection and detection system. By creating micro-segmentation within the protected network, it limits the effects that an internal intrusion could have on the entire network.

In conclusion,

While compliance with security policies set by organizations and the education of those who work there are necessary, they are insufficient to ensure good protection of the organization's computer system.

A security system designed in accordance with the fundamental laws of computer security, namely ZERO TRUST and MICRO-SEGMENTATION, like the one offered by ARCHANGEL© 2.0, is necessary and indispensable to protect against all types of cyberattacks, especially those resulting from human error.

1. https://www.globalsecuritymag.fr/comment-prevenir-l-erreur-humaine-dans-la-cybersecurite.html

#firewall #NGFW #archangel #ptsydeco #sydeco #zerotrust #microsegmentation #humanerror

Comments

Popular posts from this blog

KEUANGAN & DATA PRIBADI PEMAIN GAME ONLINE DALAM BAHAYA

Melindungi Gamer Online: Memahami Risiko dan Solusi Dalam beberapa tahun terakhir, dunia game online telah mengalami pertumbuhan eksponensial, sejalan dengan meningkatnya nilai aset game. Namun, lonjakan popularitas ini juga membawa segudang risiko yang mengancam para pemain dan operator. Dari upaya peretasan dan pencurian akun hingga transaksi yang tidak sah dan eksploitasi data, bahaya yang mengintai di dunia digital selalu ada. Mengingat tantangan-tantangan ini, sangat penting untuk menjelaskan pentingnya langkah-langkah perlindungan yang kuat dan solusi inovatif. Memahami Lanskap Aset game, yang terdiri dari mata uang virtual, item, dan akun, adalah sumber kehidupan ekonomi game online. Nilainya melampaui ranah virtual, bahkan sering kali melampaui transaksi di dunia nyata. Meskipun demikian, perlindungan konsumen tradisional yang diberikan oleh layanan perbankan dan pembayaran tidak ada di ranah game. Operator platform game sering kali mengadopsi pendekatan laissez-faire, membuat
We are a revolutionary startup that focuses on Cyber   Security, with a mission to support and protect national information technology systems and business organizations from cyber attacks. It cannot be denied that the condition of cyber security in Indonesia is currently facing serious challenges. According to data, the number of cyber attacks in Indonesia has increased quite significantly every year. The impact is not only felt by the government sector, but also by various industrial sectors such as banking, e-commerce, and even education. However, amidst the challenges, we also see great opportunities and hopes for the future. Increasing public understanding of the importance of cyber security, supported by the acceleration of digital transformation in various aspects of society, provides space for PT SYDECO to contribute more in maintaining Indonesia's cyber security. In the future, cyber security trends are predicted to continue to develop, especially in line with the increasi

The Cloud Security Debate: Weighing Risks and Benefits

  In a recent article dated December 2, 2023, Patrick Ruiz revealed a significant data breach at Okta, Inc., a San Francisco-based American company specializing in identity and access management software for businesses utilizing cloud-based services. This breach, combined with prior incidents like Google Drive's data loss, reignites concerns about the reliability of cloud service providers (1). Ruiz acknowledges the undeniable advantages of Cloud computing: cost-efficient infrastructure maintenance, reduced energy consumption, rapid deployment of applications, and accessible backup solutions. However, he fails to address the associated costs. Conversely, David Heinemeier Hansson of Basecamp disputes the cost-effectiveness of Cloud services. In October 2022, Hansson stated that Basecamp spent over $3.2 million in the Cloud, prompting their shift to on-premise hosting, a move projected to save $7 million over 5 years while only requiring a $600,000 investment in hardware amortized ov