Blog Layout

Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data

Ep. 27: Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data 

On Outside-IN, Sean, IST's IT Security Engineer II and an IT infrastructure and cybersecurity expert discusses the human element in securing IT systems. Sean stresses user awareness training, vigilance against phishing, and the evolving tactics of threat actors in cybersecurity. We also touch on AI's dual role in cybersecurity - from DeepFakes risks to behavioral analytics benefits. The conversation dives into data security, privacy nuances, and legal governance. Sean shares security tips, including unique passwords and multi-factor authentication. Stay ahead of cyber threats and take actionable steps to improve data security on Outside-IN.

  • Episode Highlights

    Connect with Sean Mannix or LinkedIn


    Learn more about: Leveraging AI for Data Breach Response | Disaster Recover Plans | Preventing Employee Data Theft


    • Human Element in Cybersecurity: Human error accounts for a significant percentage of successful cybersecurity incidents. He emphasizes the importance of training users to be aware of their actions and their impact on security, including practices like document shredding to prevent data loss.
    • Creativity in Combating Threat Actors: With the constant "cat and mouse game" with threat actors, emphasizing creativity and ongoing education to avoid sophisticated phishing and other cyber-attacks.
    • Importance of Reporting Phishing: Strategies to encourage user reporting of phishing activities, including making the process engaging and responsive, to help identify and mitigate threats.
    • Emerging Threats and the Role of AI: The potential for AI to create more sophisticated vishing attacks and the importance of vigilance and user training to recognize unusual requests.
    • Email and Cloud Storage Security: Procedures when a phishing email is reported and the security measures for cloud storage, including encryption in transit and at rest, to protect data.
    • Endpoint Security and User Authentication: Security measures on user workstations, including encryption, next-gen antivirus solutions, and the importance of keeping software and systems updated.
    • Password Management and Policies: Sean advocates for using passphrases over complex passwords for better security and user memorability, reflecting a shift in guidance towards creating secure, user-friendly access protocols.

Listen, Watch and Subscribe!

Check out our previous episodes here:

IST’s New Partnership with PaYS (Partnership for Your Success) with Charles Riddervold
By Brad Burgess 13 Mar, 2024
Regional Operations Manager and Army Veteran Charles Riddervold shares his experience with the Partnership for Your Success (PaYS) program, an initiative by the United States Army to help veterans transition into civilian careers, and IST's brand new partnership. Sourcing military veterans for career opportunities highlights their strong work ethic, leadership skills, and commitment to excellence. On Outside-IN, we touch on the misconceptions about the military, the importance of leadership training, and the role of creativity in finding innovative hiring solutions.
Beyond Resumes: Connecting Candidates to Careers
By Brad Burgess 13 Feb, 2024
Finding the right career opportunity can feel like a frustrating and impersonal experience for applicants, but Vice President of Talent Acquisition Sydney Ayers challenges this mindset with intentional action. On Outside-IN, we talk about IST's recruitment efforts, from LinkedIn connections to campaigns sourcing military personnel and what not to do in your hiring process.
By Brad Burgess 11 Jan, 2024
The term AI receives a full spectrum of responses in the legal world. From excitement to fear, attorneys and their clients are navigating how AI will affect their service, and, for some, suspicious that it will enhance it. On Outside-IN, National Director of Training Jeff Grogan joins us to explain AI, sharing its current use in litigation and where it's headed. We discuss past feared technologies that have earned a trusted place in the EDRM process and tackle what everyone is talking about– generative AI.
More Episodes
Share by: