Blog Layout

Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data

Ep. 27: Inside Cybersecurity: Unmasking Human Error & Safeguarding Your Data 

On Outside-IN, Sean, IST's IT Security Engineer II and an IT infrastructure and cybersecurity expert discusses the human element in securing IT systems. Sean stresses user awareness training, vigilance against phishing, and the evolving tactics of threat actors in cybersecurity. We also touch on AI's dual role in cybersecurity - from DeepFakes risks to behavioral analytics benefits. The conversation dives into data security, privacy nuances, and legal governance. Sean shares security tips, including unique passwords and multi-factor authentication. Stay ahead of cyber threats and take actionable steps to improve data security on Outside-IN.

  • Episode Highlights

    Connect with Sean Mannix or LinkedIn


    Learn more about: Leveraging AI for Data Breach Response | Disaster Recover Plans | Preventing Employee Data Theft


    • Human Element in Cybersecurity: Human error accounts for a significant percentage of successful cybersecurity incidents. He emphasizes the importance of training users to be aware of their actions and their impact on security, including practices like document shredding to prevent data loss.
    • Creativity in Combating Threat Actors: With the constant "cat and mouse game" with threat actors, emphasizing creativity and ongoing education to avoid sophisticated phishing and other cyber-attacks.
    • Importance of Reporting Phishing: Strategies to encourage user reporting of phishing activities, including making the process engaging and responsive, to help identify and mitigate threats.
    • Emerging Threats and the Role of AI: The potential for AI to create more sophisticated vishing attacks and the importance of vigilance and user training to recognize unusual requests.
    • Email and Cloud Storage Security: Procedures when a phishing email is reported and the security measures for cloud storage, including encryption in transit and at rest, to protect data.
    • Endpoint Security and User Authentication: Security measures on user workstations, including encryption, next-gen antivirus solutions, and the importance of keeping software and systems updated.
    • Password Management and Policies: Sean advocates for using passphrases over complex passwords for better security and user memorability, reflecting a shift in guidance towards creating secure, user-friendly access protocols.

Listen, Watch and Subscribe!

Check out our previous episodes here:

From Collection to Courtroom: How IST Leads in Forensic Innovation
By Brad Burgess February 20, 2025
In this episode of Outside In, we delve into the intricate world of digital forensics with IST’s Arthur Schmeiser, National Director of Forensics eDiscovery, exploring how their expert team navigates the complexities of data collection, analysis, and preservation. From senior professionals with advanced certifications providing defensible evidence in court to innovative remote collection methods that streamline processes for clients worldwide, IST sets the standard for excellence. Learn how their transparent, client-focused approach, bolstered by cutting-edge technology and AI advancements, ensures secure and reliable solutions in a rapidly evolving landscape. Whether addressing litigation, employee investigations, or emerging challenges like deep fakes, IST's dedication to precision and efficiency shines through.
Streamlined, Secure, and Scalable: Digital Mail’s Role in Modern Business Compliance
By Brad Burgess January 21, 2025
We dive into the future of document management with IST Management’s Operations Manager, Mark Whitley, who reveals how digital mail solutions are transforming the way businesses handle critical mail and documents.
Outside-In Podcast thumbnail
By Brad Burgess December 12, 2024
In this special episode of the Outside-IN podcast, host Brad Burgess takes listeners on an insightful journey into how AI is transforming the business landscape at IST Management and beyond.
More Episodes
Share by: