Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data

Ep. 27: Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data 

On Outside-IN, Sean, IST's IT Security Engineer II and an IT infrastructure and cybersecurity expert discusses the human element in securing IT systems. Sean stresses user awareness training, vigilance against phishing, and the evolving tactics of threat actors in cybersecurity. We also touch on AI's dual role in cybersecurity - from DeepFakes risks to behavioral analytics benefits. The conversation dives into data security, privacy nuances, and legal governance. Sean shares security tips, including unique passwords and multi-factor authentication. Stay ahead of cyber threats and take actionable steps to improve data security on Outside-IN.

  • Episode Highlights

    Connect with Sean Mannix or LinkedIn


    Learn more about: Leveraging AI for Data Breach Response | Disaster Recover Plans | Preventing Employee Data Theft


    • Human Element in Cybersecurity: Human error accounts for a significant percentage of successful cybersecurity incidents. He emphasizes the importance of training users to be aware of their actions and their impact on security, including practices like document shredding to prevent data loss.
    • Creativity in Combating Threat Actors: With the constant "cat and mouse game" with threat actors, emphasizing creativity and ongoing education to avoid sophisticated phishing and other cyber-attacks.
    • Importance of Reporting Phishing: Strategies to encourage user reporting of phishing activities, including making the process engaging and responsive, to help identify and mitigate threats.
    • Emerging Threats and the Role of AI: The potential for AI to create more sophisticated vishing attacks and the importance of vigilance and user training to recognize unusual requests.
    • Email and Cloud Storage Security: Procedures when a phishing email is reported and the security measures for cloud storage, including encryption in transit and at rest, to protect data.
    • Endpoint Security and User Authentication: Security measures on user workstations, including encryption, next-gen antivirus solutions, and the importance of keeping software and systems updated.
    • Password Management and Policies: Sean advocates for using passphrases over complex passwords for better security and user memorability, reflecting a shift in guidance towards creating secure, user-friendly access protocols.

Listen, Watch and Subscribe!

Check out our previous episodes here:

Promotional graphic with text, green “IN OUTSIDE IN” logo, and  Sara Asgur's portrait on the right.
By Brad Burgess April 24, 2026
Dive into eDiscovery and AI in our latest podcast episode featuring IST's Senior eDiscovery Project Manager/Sales Engineer Sara Asgur! Listen as Sara shares her journey in the field and the revolutionary ways AI is being utilized to streamline the review process.
Podcast graphic titled
By Brad Burgess March 26, 2026
In this episode, operations leader Mike Horton, Operations Manager, reveals his "blueprint" for transforming nervous new clients into long-term, trusted partners by mastering the critical transition from initial implementation to daily excellence.
Brad Mitchell, Implementation Manager at IST
By Brad Burgess January 20, 2026
Implementations don’t fail because of technology—they fail when people feel unheard, surprised, or overwhelmed.
More Episodes