{"id":1561,"date":"2022-02-02T09:25:37","date_gmt":"2022-02-02T09:25:37","guid":{"rendered":"https:\/\/www.argentxcyber.com\/blog\/?p=1561"},"modified":"2022-02-02T09:31:03","modified_gmt":"2022-02-02T09:31:03","slug":"human-firewall","status":"publish","type":"post","link":"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/02\/02\/human-firewall\/","title":{"rendered":"Cybersecurity &#8211; 7 Important Ways an End-user can Become a Human Firewall"},"content":{"rendered":"<p><span data-contrast=\"none\">Cybersecurity today is all about being on guard. More and more end-users are put on task to own their security online. Of course, you could have physical security, expertise, and technical guards to boot, but humans play an essential role in ensuring data is safe across the board.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Human firewalling is a concept&nbsp;that came about&nbsp;once&nbsp;the acknowledgement was made that end-users make costly mistakes. To err is human, but being proactive&nbsp;in cybersecurity&nbsp;is divine!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><!--more--><\/p>\n<p><span data-contrast=\"none\">\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"none\">So, what is a&nbsp;Human&nbsp;Firewall?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">A firewall is a software or firmware that prevents unauthorized access to a network by monitoring internet traffic in, out, or within a private network. Being a human firewall is the&nbsp;end-users&nbsp;commitment to best practices and being cyber competent to fulfil their end of the security chain.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">The backbone of most cyberthreats is hackers and bad actors exploiting end-user curiosity, goodwill, and misinformation. The&nbsp;end-users&nbsp;best chance against such threats is education, best practices, and good old-fashioned discernment. According to\u202f<\/span><a href=\"http:\/\/www.ibm.com\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">IBM<\/span><\/span><\/a><span data-contrast=\"none\">, the average cost of human errors in cybersecurity breaches in 2020 alone was $3.33 million, presenting human error as a weak link in cybersecurity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">\u202f\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><b><span data-contrast=\"none\">End-users&nbsp;Can Be the Strongest Link<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Data Security Perspectives considers how important shared end-user responsibility is to protect networks, devices, and data in any environment. Major pain points are grounded in a combination of end-user participation and device integrity, both hardware and software.&nbsp;<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">Human firewalling fulfils&nbsp;half of the equation in cybersecurity playbooks and proves vital in fostering security, especially in businesses. But, as an end-user, how do you take the initiative to ensure you are an essential link in this equation?<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">How&nbsp;an End-user can Become&nbsp;a Human Firewall:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Training. It all starts with continuous education to create a strong foundation for end-user best practices in cybersecurity.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Stay vigilant. Always be on the lookout for the social engineering hallmarks and note or report any suspicious activity. It will create a security-focused culture where security is a priority with every action, workflow, and process as a collective.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Secure Connections and Networks. Always use secure Wi-Fi and a well-researched VPN to mask your presence on unfamiliar networks. Find out more about how wireless connections can compromise your security\u202f<\/span><a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2022\/01\/04\/cybersecurity-wi-fi\/\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">here<\/span><\/span><\/a><span data-contrast=\"none\">.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Social media. You would be surprised how many details about yourself are revealed to strangers when you overshare on social media: Addresses, credit card information, place of work, etc. The fewer specifics out there about you on social media, the better.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Password management. Astonishingly, 123456 was the most common password in 2021 and took less than a second for hackers to crack! Get unique passphrases as passwords, a password manager, and an authenticator to boot.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Protection. You need to install anti-malware software as a viable preventive measure on all your devices. The goal is to protect your files and browsing experience, reducing the chance of a malware-based attack.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"10\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Testing and monitoring. Continuously evaluate the effectiveness of your approach and update your software accordingly to keep up with emerging cyber threats. You snooze, you lose!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\" style=\"font-size: 16px\">With most scams resting on the chance to take advantage of human behaviour like curiosity, being a human firewall is more important than ever. The end-user can be such a massive asset to any organization through support, training, and ownership of best practices. Find out more on how you can involve end-users in your cybersecurity strategy\u202f<\/span><span data-contrast=\"none\" style=\"color: #0000ff\"><a href=\"https:\/\/www.argentxcyber.com\/blog\/index.php\/2021\/12\/21\/cybersecurity\/\" style=\"color: #0000ff\">here<\/a><\/span><span data-contrast=\"none\" style=\"font-size: 16px\">!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\" style=\"font-size: 16px\">&nbsp;<\/span><\/p>\n<p><span data-contrast=\"none\">As the end-user continues to be proactive and reactive to prioritize security, especially in the era of remote working, their&nbsp;defences&nbsp;will be more iron-clad. As a result, they need the right tools to be a robust stopper to cyber threats and be a discerning human firewall.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">Get in touch with us\u202f<\/span><a href=\"https:\/\/argentxcyber.com\/contact\"><span data-contrast=\"none\"><span style=\"color: #0000ff\">here<\/span><\/span><\/a><span data-contrast=\"none\">\u202fto get started on building a solid cybersecurity strategy for your business today.\u202f<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335559740&quot;:240}\">&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity today is all about being on guard. More and more end-users are put on task to own their security online. Of course, you could have physical security, expertise, and technical guards to boot, but humans play an essential role in ensuring data is safe across the board.&nbsp;&nbsp; Human firewalling is a concept&nbsp;that came about&nbsp;once&nbsp;the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1562,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,17],"tags":[],"class_list":["post-1561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-strategy","category-business"],"_links":{"self":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":5,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1561\/revisions"}],"predecessor-version":[{"id":1567,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1561\/revisions\/1567"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/1562"}],"wp:attachment":[{"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.argentxcyber.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}