Human Firewalls
govciooutlookapac

Human Firewalls

Kent E, Director of Communication & Information Systems, Dona Ana County

Kent E, Director of Communication & Information Systems, Dona Ana County

The Weakest Link 

As technology evolves, the biggest cyber security risk remains the human factor, and the stakes for local governments couldn’t be higher. A single attack can cripple constituent services or even bankrupt smaller municipalities. The percentage of successful cyber-attacks or data breaches that involve human error as a root cause is extremely high – an estimated 88 to 95%. "Human Error” is a broad category that includes several distinct actions, not just simple mistakes. When such a high percentage is cited, it usually includes all incidents where a human action inadvertently or negligently contributed to the breach, such as:

• Clicking on a phishing link or providing account information to a deceptive email.

• Using default, simple, or the same passwords and failing to secure them.

• Misconfiguring servers, cloud platforms, or firewalls that expose sensitive data.

• Sending sensitive data to the wrong recipient, losing devices, or not following data handling procedures.

While hackers rely on technical vulnerabilities, they most often gain access by exploiting human vulnerabilities like trust, distraction, haste, or lack of training. 

AI Powered Threats 

The introduction of sophisticated AI technologies, particularly Large Language Models (LLMs) and autonomous "AI agents," has fundamentally changed the cyber threat landscape. AI is no longer just assisting hackers; it is now organizing and executing entire attack campaigns with minimal human intervention.

AI agents can scan a target network for vulnerabilities and then generate code to capture credentials, elevate privileges, and extract data with minimal human interaction. They can also monitor networks in real-time and continuously change their attack strategy which is difficult for humans to defend. AI systems can submit thousands of requests per second against multiple targets at the same time.

AI has all but eliminated the “red flags” that people used to help detect phishing like bad grammar and generic content. LLMs can create almost perfect content with flawless grammar and personalization to match an individual’s style and voice. Deepfakes can be used to impersonate employees or vendors during video or phone calls bypassing authentication based on voice recognition. AI can also be used to create realistic online profiles to gain employee trust before launching an attack.

AI enables malicious code to adapt and evade detection by generating and rewriting itself with a unique signature for every execution. Malware can use AI to analyze its environment and change its behavior in real-time to go undetected by security tools. AI can also be used to scan for zero-day vulnerabilities and dynamically create code to exploit a specific system before a solution is available.

“The most effective strategy for minimizing cyber risk is treating employees as the primary defense layer rather than the weakest link.”

AI is being used by hackers against the tools deployed to stop them. They can inject bad data into the models used to train them to create a future backdoor. Attackers can also use knowledge of the AI defense systems to make small changes to their malware and emails to fool it into passing through the attack.

The net effect of these threats is putting highly effective, complex tools into the hands of lower skilled threat actors which greatly increases the overall volume and sophistication of attacks.  Criminal groups are using the same business model as legitimate companies by creating ready-made tools and services that can be purchased for use.

Building Human Firewalls

The most effective strategy for minimizing cyber risk is treating employees as the primary defense layer rather than the weakest link. This can be accomplished through education & training, technical controls, and operational process improvements.

Training must be continuous, engaging, and highly relevant to be effective. Use short videos frequently that are based on current, real-world threats. Schedule random, realistic phishing campaigns and immediately revisit training with employees that click on the link, so they understand how they were fooled and how to spot the red flags. For high-risk positions (e.g. Executive Management, HR, Finance), create specialized training for threats that target their areas.

Implement technology that makes it harder for errors to succeed and easier to catch them. Use multi-factor authentication for all critical systems. Deploy email scanning tools to detect and remove suspect attachments and links before they reach a user’s mailbox. Enforce strong passwords and block attempts to send sensitive data to external recipients.

Design processes that bake security into routine tasks, reducing the reliance on perfect human judgment. Utilize a two-person verification process for transferring funds or changing vendor information. Ensure that employees only have access to the data and systems to perform their jobs. Automatically apply updates to applications and operating systems to eliminate vulnerabilities. Make it easy for users to report suspicious emails directly from the mail client.

Resilience First

Although the exact figures vary among reports from the major cybersecurity firms, the consensus is that most security incidents have a human element. By combining continuous training with smart technical and procedural safeguards, companies can significantly reduce the possibility of human error turning into a successful cyber-attack. Prevention is no longer enough. The strategic focus has shifted to “Cyber Resilience” – the ability to anticipate, withstand, recover from, and adapt to adverse conditions and attacks.

tag

AI

HR

Weekly Brief

Read Also

Communicating with Purpose in an Age of Complexity

Aislynn Tolman-Hill, Communication, Quality Improvement, & Disparity Reduction Manager, Utah County Health Department

Human Firewalls

Kent E, Director of Communication & Information Systems, Dona Ana County

Designing Sustainable Growth for Thriving Communities

Jennifer Gomez, MPA, Exec. Director of Economic Development & Redevelopment, City of Tulare

Driving Sustainable Economic Growth through Partnerships and Quality-of-Place

Danielle Cohen Lima, Economic Development Director, City of Sunrise

A Life of Service

Xavier ROBINSON, CEM, Law Enforcement Officer at City of Miami Gardens

Sustainable Growth through Partnerships and Community Alignment

Paul Ruane, Assistant Director of Community and Economic Development, City of Oak Forest, Illinois