Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data

Ep. 27: Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data 

On Outside-IN, Sean, IST's IT Security Engineer II and an IT infrastructure and cybersecurity expert discusses the human element in securing IT systems. Sean stresses user awareness training, vigilance against phishing, and the evolving tactics of threat actors in cybersecurity. We also touch on AI's dual role in cybersecurity - from DeepFakes risks to behavioral analytics benefits. The conversation dives into data security, privacy nuances, and legal governance. Sean shares security tips, including unique passwords and multi-factor authentication. Stay ahead of cyber threats and take actionable steps to improve data security on Outside-IN.

  • Episode Highlights

    Connect with Sean Mannix or LinkedIn


    Learn more about: Leveraging AI for Data Breach Response | Disaster Recover Plans | Preventing Employee Data Theft


    • Human Element in Cybersecurity: Human error accounts for a significant percentage of successful cybersecurity incidents. He emphasizes the importance of training users to be aware of their actions and their impact on security, including practices like document shredding to prevent data loss.
    • Creativity in Combating Threat Actors: With the constant "cat and mouse game" with threat actors, emphasizing creativity and ongoing education to avoid sophisticated phishing and other cyber-attacks.
    • Importance of Reporting Phishing: Strategies to encourage user reporting of phishing activities, including making the process engaging and responsive, to help identify and mitigate threats.
    • Emerging Threats and the Role of AI: The potential for AI to create more sophisticated vishing attacks and the importance of vigilance and user training to recognize unusual requests.
    • Email and Cloud Storage Security: Procedures when a phishing email is reported and the security measures for cloud storage, including encryption in transit and at rest, to protect data.
    • Endpoint Security and User Authentication: Security measures on user workstations, including encryption, next-gen antivirus solutions, and the importance of keeping software and systems updated.
    • Password Management and Policies: Sean advocates for using passphrases over complex passwords for better security and user memorability, reflecting a shift in guidance towards creating secure, user-friendly access protocols.

Listen, Watch and Subscribe!

Check out our previous episodes here:

The Method, the Playbook, and the War Room: How Creativity Drives Customer Service in IT
By Brad Burgess December 12, 2025
In this episode of Outside-IN, we are talking with Ted Korba, Senior Director of IT Services, about how IT Service Management (ITSM)—including problem, change, and incident management—serves as a necessary "playbook" to bring "a method to the madness" in today’s chaotic, technology-heavy corporate world.
Outside In Podcast presented by IST: Mail Security Strategy
By Brad Burgess November 3, 2025
Tune in to the Outside-IN podcast to hear Charles Riddervold, National Director of Operations and Proposal Strategy, who began his career in mail security nearly 40 years ago while screening packages for soldiers in the Army.
IST Management Outside-IN podcast with Maggie Cantalupo
By Brad Burgess September 24, 2025
Join us on "Outside-IN" as we welcome back Maggie Cantalupo, an expert who has seamlessly transitioned her extensive background in five-star hospitality, from luxurious resorts to prestigious hotels like the Essex House, into the dynamic world of modern Workplace Experience.
More Episodes