Cybersecurity – We are all human

By Elvis Huff on November 14, 2019
5 minute read

Have you ever made a cybersecurity mistake? I have. Don’t feel bad though, it happens to all of us – from the tech savvy to the not-so-tech savvy, we are all susceptible to letting an attacker in.

The most important thing is that we learn from it and do not do it again.


We humans sometimes make mistakes, even in cybersecurity. How soon after the mistake did you realize it and change something? Agility is important in cybersecurity. The speed at which we correct something, once discovered, may reduce the likelihood that a cybercriminal exploited our mistake. You may have improved your security before a criminal even noticed and took advantage of the opportunity!

3 vulnerabilities

That is why it is important to recognize three easy vulnerabilities that criminals use to get our data.

  1. Spear Phishing – phishing emails continue to plague many consumers and businesses. Learn to recognize suspicious emails now.
  2. Stolen Credentials – Usernames and passwords are easy to get if a criminal can trick you into giving them out. Be aware of downloading software, links in emails, and unsolicited tech support phone calls. Scams usually start out this way.
  3. Unpatched systems/software– Are you still running Windows XP? I hope not. Keep your systems, including phones and tablets, up to date by downloading the updates from the manufacturer. Better yet, turn on automatic updating and plan to buy new devices periodically.


Human error tends to be at the top when it comes to the reasons for system breaches. That’s why criminals target people first and machines second.

What was your biggest cybersecurity mistake? Tell us below (but don’t expose too much information).

Have another thought, tip or suggestion? Leave it in the comments below. I would love to hear from you!

Posted by Elvis Huff

Elvis Huff worked as an officer and network administrator for 12 years with the Lebanon Police Department and has also served as an adjunct professor in information systems at Cumberland University. Read More »

Leave a reply

Your email address will not be published. Required fields are marked *