Articles about Human Risk Management

Careless users cause data loss incidents

A new study from Proofpoint shows that 85 percent of organizations polled experienced at least one data loss incident in the past year. Even the country with the lowest percentage -- the UK -- still had 73 percent of respondents reporting at least one incident in the past 12 months.

What's particularly interesting though is that careless users, accounting for 70.6 percent, are much more likely to cause these incidents than compromised (48.1 percent) or misconfigured systems (45.3 percent).

Continue reading

Why human risk management is key to data protection

Data

Personal data is constantly being processed and transferred in numerous ways -- whether in healthcare applications, store loyalty programs, during purchases or while browsing online. With such a vast amount of personal data in circulation, the likelihood of errors occurring is heightened.

It feels like almost every day we hear a story of another company being breached -- with data being stolen by cybercriminals looking to steal an individual’s identity, access accounts or commit fraud. Things are also getting easier for cybercriminals, thanks to technology advancements like generative AI assisting with more convincing phishing emails and deepfake content.

Continue reading

Beyond phishing: The top employee security risks you're probably not measuring

While we all know email is a big target for attackers, it’s important to remember that email is not the only risk vector. As companies use more tools and features, the risks grow too. Email is just one piece of the puzzle, which is why it is crucial to consider a wide range of employee security behaviors to get a holistic view of your risks. By doing so, you can focus resources more efficiently.

Human Risk Management (HRM) is a vital part of cyber security. Even if you have technological safeguards in place, HRM plays a substantial role in your overall security stance. Here I highlight some of the employee cyber risks that often get overlooked and how we can better keep an eye on them in real time.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

Regional iGaming Content

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.