Skip to main content

                                                       

ERRARE HUMANUM EST


 The Inescapable Nature of Human Error and Its Implications in Cybersecurity

To err is human; one could even say it is a defining characteristic of humanity. Who has never made a mistake, whether out of distraction, ignorance, or because it was provoked?

No one is immune to making mistakes, and most of the time, they are forgivable, even if their consequences can be very damaging.

However, the fundamental, unforgivable error is doing nothing to avoid situations that lead to mistakes.

Thus, to minimize errors due to distraction, one should avoid multitasking (for example, a surgeon operating should not be distracted by a nurse recounting her latest adventures) and refrain from performing actions mechanically. As for errors committed out of ignorance, it is best to educate oneself before making a decision (in matters of justice, this problem is addressed by the maxim that no one can ignore the law). In the case of an error intentionally provoked by a third party, the best advice is to always think before acting and leave the "I act, then I think" approach to politicians.

No activity involving humans is immune to the consequences of the errors they might make.

This is especially true in the field of cybersecurity.

However, one must not confuse the error with its consequences, as I recently read in an article by Arnaud De Backer1, who writes that "In the field of cybersecurity, human error refers to security breaches and data leaks that result from human actions and decisions."

All cybersecurity professionals will tell you that humans are the weak link in cybersecurity because they are not immune to making mistakes, regardless of their level of education or preparation: Zero risk does not exist.

Of course, we should not reject everything the specialized literature tells us about internet user education, but we must ask ourselves if we are fighting the wrong battle by striving at all costs to prevent human error rather than focusing on limiting its consequences.

It is based on these reflections that PT SYDECO created its ARCHANGEL© 2.0 INTEGRATED DEFENSE SYSTEM, which aims not only to protect industrial or information systems from direct and indirect cyberattacks but also to prevent human error from having the same negative effects on the system, or at least to minimize its consequences as much as possible.

ARCHANGEL© 2.0, a next-generation firewall, was designed by integrating the ZERO TRUST rule into its protection and detection system. By creating micro-segmentation within the protected network, it limits the effects that an internal intrusion could have on the entire network.

In conclusion,

While compliance with security policies set by organizations and the education of those who work there are necessary, they are insufficient to ensure good protection of the organization's computer system.

A security system designed in accordance with the fundamental laws of computer security, namely ZERO TRUST and MICRO-SEGMENTATION, like the one offered by ARCHANGEL© 2.0, is necessary and indispensable to protect against all types of cyberattacks, especially those resulting from human error.

1. https://www.globalsecuritymag.fr/comment-prevenir-l-erreur-humaine-dans-la-cybersecurite.html

#firewall #NGFW #archangel #ptsydeco #sydeco #zerotrust #microsegmentation #humanerror

Comments

Popular posts from this blog

KEUANGAN & DATA PRIBADI PEMAIN GAME ONLINE DALAM BAHAYA

Melindungi Gamer Online: Memahami Risiko dan Solusi Dalam beberapa tahun terakhir, dunia game online telah mengalami pertumbuhan eksponensial, sejalan dengan meningkatnya nilai aset game. Namun, lonjakan popularitas ini juga membawa segudang risiko yang mengancam para pemain dan operator. Dari upaya peretasan dan pencurian akun hingga transaksi yang tidak sah dan eksploitasi data, bahaya yang mengintai di dunia digital selalu ada. Mengingat tantangan-tantangan ini, sangat penting untuk menjelaskan pentingnya langkah-langkah perlindungan yang kuat dan solusi inovatif. Memahami Lanskap Aset game, yang terdiri dari mata uang virtual, item, dan akun, adalah sumber kehidupan ekonomi game online. Nilainya melampaui ranah virtual, bahkan sering kali melampaui transaksi di dunia nyata. Meskipun demikian, perlindungan konsumen tradisional yang diberikan oleh layanan perbankan dan pembayaran tidak ada di ranah game. Operator platform game sering kali mengadopsi pendekatan laissez-faire, membuat ...
 Hospital Security in Question In a recent article titled "Cyberattacks: Public and Private Hospitals, Is the Worst Yet to Come?", Jean-Michel Tavernier1 provides a detailed analysis of why the medical sector is a prime target for hackers. He highlights the vulnerabilities that allow hackers to access sensitive data such as medical records, insurance information, and payment details. The compromise of this data can have severe consequences for individuals' privacy, financial security, and even personal safety, not to mention the financial damage to institutions and the risks to the quality of care provided to patients. System Vulnerabilities Tavernier points to the "excessive interdependence of the entire healthcare chain." Hospitals collaborate with a multitude of interconnected providers and partners, creating numerous opportunities for attackers. He suggests managing the attack surface (ASM), which means controlling and securing all entry points where unautho...