{"id":2784,"date":"2017-12-02T19:14:12","date_gmt":"2017-12-02T19:14:12","guid":{"rendered":"https:\/\/ptp.cloud\/ptp\/?p=2784"},"modified":"2024-05-06T22:33:12","modified_gmt":"2024-05-07T02:33:12","slug":"cybersecurity-and-the-human-factor","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/","title":{"rendered":"Cybersecurity and the &#8220;Human Factor&#8221;"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p>A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today\u2019s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even with the proliferation of new security devices and software that claim to replace the need for human action via automation.<\/p>\n<p><strong>Businesses are simply not going to automate and orchestrate their way out of the security challenges that we face today.<\/strong><\/p>\n<p>New security devices and software belch vast amounts of data containing the single information nuggets that hold the clues to a security event. These \u201cclues\u201d often go unnoticed amidst the noise of the massive data flow, and companies lack the staff to continually investigate the large number of events these systems deem as actionable.<\/p>\n<p>This is where my company comes in. Pinnacle\u2019s approach to security management leverages processes and tools to the fullest but, at the end of the day, it is a human being with a deep interest in our mutual success that makes the difference. Our mission is to reduce the noise, inspect the right data and provide our customers with actionable security events.<\/p>\n<p>As an example, for one of our smaller Managed SOC clients, we ingested 1.6 billion security events last month from their tools. Per our custom rules, our platform created 31 actionable incidents. Each of those 31 incidents was reviewed and triaged by a SOC Analyst. We are looking for the needle in the haystack&#8212;the needle that could cause a puncture.<\/p>\n<p>In this case only one incident, of the 1.6B, was escalated for response and remediation.<\/p>\n<p>The inspection of actionable events is done by our people, interacting with your people, who collectively bring timely visibility to the security events that impact your organization.<\/p>\n<p>All of the tools that you have purchased will be defeated until there is a time when AI can understand the mistakes a human can make. Until then, it will take humans to find and mitigate today\u2019s security threats.<\/p>\n<p>For a demo and overview of our human approach to security incident management, please <a href=\"mailto:esimmons@pinnacletechpartners.com\" target=\"_blank\" rel=\"noopener noreferrer\">contact me<\/a>.<\/p>\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>A very large percentage of security breaches are caused by human error. HUMANS are the weakest security link in today\u2019s technology infrastructure. That said (and perhaps ironically), best security practices require continual human examination and intervention, even with the proliferation of new security devices and software that claim to replace the need for human action [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2787,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[189,10],"tags":[],"table_tags":[],"class_list":["post-2784","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-archive","category-secops-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity and the &quot;Human Factor&quot; | PTP News<\/title>\n<meta name=\"description\" content=\"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity and the &quot;Human Factor&quot; | PTP News\" \/>\n<meta property=\"og:description\" content=\"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-02T19:14:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-07T02:33:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"449\" \/>\n\t<meta property=\"og:image:height\" content=\"336\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"PTPstaff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PTPstaff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\"},\"author\":{\"name\":\"PTPstaff\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\"},\"headline\":\"Cybersecurity and the &#8220;Human Factor&#8221;\",\"datePublished\":\"2017-12-02T19:14:12+00:00\",\"dateModified\":\"2024-05-07T02:33:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\"},\"wordCount\":463,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg\",\"articleSection\":[\"Blog\",\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\",\"url\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\",\"name\":\"Cybersecurity and the \\\"Human Factor\\\" | PTP News\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg\",\"datePublished\":\"2017-12-02T19:14:12+00:00\",\"dateModified\":\"2024-05-07T02:33:12+00:00\",\"description\":\"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg\",\"width\":449,\"height\":336,\"caption\":\"Keyboard with an \\\"oops\\\" key, highlighting the role of human error in security breaches.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and the &#8220;Human Factor&#8221;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5\",\"name\":\"PTPstaff\",\"sameAs\":[\"https:\/\/ptpcloud.mystagingwebsite.com\/ptp\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity and the \"Human Factor\" | PTP News","description":"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity and the \"Human Factor\" | PTP News","og_description":"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.","og_url":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2017-12-02T19:14:12+00:00","article_modified_time":"2024-05-07T02:33:12+00:00","og_image":[{"width":449,"height":336,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","type":"image\/jpeg"}],"author":"PTPstaff","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"PTPstaff","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/"},"author":{"name":"PTPstaff","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5"},"headline":"Cybersecurity and the &#8220;Human Factor&#8221;","datePublished":"2017-12-02T19:14:12+00:00","dateModified":"2024-05-07T02:33:12+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/"},"wordCount":463,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","articleSection":["Blog","SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/","url":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/","name":"Cybersecurity and the \"Human Factor\" | PTP News","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","datePublished":"2017-12-02T19:14:12+00:00","dateModified":"2024-05-07T02:33:12+00:00","description":"Explore the crucial role of human intervention in cybersecurity. Learn how PTP leverages human expertise alongside advanced tools to uncover actionable security insights amidst vast data flows.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","width":449,"height":336,"caption":"Keyboard with an \"oops\" key, highlighting the role of human error in security breaches."},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/cybersecurity-and-the-human-factor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and the &#8220;Human Factor&#8221;"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/23219285c14844480b63688ae98ff7c5","name":"PTPstaff","sameAs":["https:\/\/ptpcloud.mystagingwebsite.com\/ptp"]}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/human-factor-post-feature.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2784","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=2784"}],"version-history":[{"count":0,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/2784\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/2787"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=2784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=2784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=2784"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=2784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}