{"id":206,"date":"2023-08-08T12:51:09","date_gmt":"2023-08-08T12:51:09","guid":{"rendered":"https:\/\/cxo.exrtechsolutions.com\/?p=206"},"modified":"2023-08-10T10:41:14","modified_gmt":"2023-08-10T10:41:14","slug":"why-cybersecurity-teams-are-central-to-organisational-trust","status":"publish","type":"post","link":"https:\/\/cxo.exrtechsolutions.com\/index.php\/2023\/08\/08\/why-cybersecurity-teams-are-central-to-organisational-trust\/","title":{"rendered":"Why cybersecurity teams are central to organisational trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"206\" class=\"elementor elementor-206\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5665bf46 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"5665bf46\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5bf3d0b3\" data-id=\"5bf3d0b3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f0f6a12 elementor-widget elementor-widget-heading\" data-id=\"5f0f6a12\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">CXO<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b8c2d2 elementor-widget elementor-widget-text-editor\" data-id=\"9b8c2d2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>UPDATES<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1d6bb406\" data-id=\"1d6bb406\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-1bd6c3ed\" data-id=\"1bd6c3ed\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4365d27c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"4365d27c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-42ede0d3\" data-id=\"42ede0d3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-41dfb08f elementor-widget elementor-widget-heading\" data-id=\"41dfb08f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Why cybersecurity teams are central to organisational trust<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-683b136 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"683b136\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6896eee7\" data-id=\"6896eee7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54f6dbf9 elementor-widget elementor-widget-text-editor\" data-id=\"54f6dbf9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Trust is fundamentally based on cybersecurity. Cybersecurity teams play a vital role in creating trust across a spectrum of stakeholder groups. Customers and employees anticipate that their data will be protected and that their privacy will be respected. Investors and business partners demand a high level of security.<\/span><\/p><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6eaafb95\" data-id=\"6eaafb95\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-521d4dac elementor-widget elementor-widget-image\" data-id=\"521d4dac\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.15.0 - 02-08-2023 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2-1024x576.png\" class=\"attachment-large size-large wp-image-209\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2-1024x576.png 1024w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2-300x169.png 300w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2-768x432.png 768w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2-1536x864.png 1536w, https:\/\/cxo.exrtechsolutions.com\/wp-content\/uploads\/2023\/08\/image2.png 1920w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-50e3ccb8 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"50e3ccb8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a1b7c30\" data-id=\"6a1b7c30\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6e0b69 elementor-widget elementor-widget-text-editor\" data-id=\"b6e0b69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This is a key factor in the popularity of security, not just in boardrooms but also in IT departments. It was the top priority for IT funding according to Red Hat&#8217;s 2023 Global Tech Outlook study, and it dominated a variety of IT events last fall.\u00a0<\/span><\/p><h2><b>3 essential roles for fostering trust<\/b><\/h2><p><span style=\"font-weight: 400;\">The three difficulties that security teams have with fostering trust are:<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1395da90 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"1395da90\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6593dda2\" data-id=\"6593dda2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d56fb24 elementor-widget elementor-widget-heading\" data-id=\"5d56fb24\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Customers<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-197c847f elementor-widget elementor-widget-text-editor\" data-id=\"197c847f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The first one is about customers and more particularly, the information related to them.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">Customers&#8217; opinions on the usage of data to personalise experiences and perhaps offer useful information are debatable. For instance, the authors discovered that 68 percent of survey participants thought it was useful when a company they frequently shopped with sent them alerts when an item was on sale. However, 11% thought the same thing was unsettling. And more than half said it was unsettling if they believed a voice assistant was keeping an eye on them.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">Read the 7 security publications that every CIO has to read by 2023.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">&#8220;Organisations should also make informed decisions about what data to obtain and what not to,&#8221; the authors claim. Cyber teams are essential in advising marketing and experienced colleagues about the dangers of data gathering and which data may pose the most risk compared to the value of the data.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f10ac76 elementor-widget elementor-widget-heading\" data-id=\"6f10ac76\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Workforce<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e8a3484 elementor-widget elementor-widget-text-editor\" data-id=\"6e8a3484\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The staff of a company has an impact on the confidence clients have in it.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">The greatest significant risk is certainly internal threats to firm data. According to the authors, &#8220;a recent WSJ [Wall Street Journal] study found that 67 percent of cybersecurity specialists asked were concerned about malevolent personnel.&#8221;<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">But it might not be maliciousness\u2014just an oversight. The majority of breaches are caused by human error, not malevolent intent, according to the authors. A cybersecurity company called Tessian and Stanford University researchers discovered that human error is at blame for almost 88 percent of all data breaches. As with many other facets of IT operations, it usually makes sense to look at the process before blaming the employee if the system permits a straightforward misconfiguration or other faults to result in a significant failure.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3eaa0da9 elementor-widget elementor-widget-heading\" data-id=\"3eaa0da9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Partners <\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b81c76 elementor-widget elementor-widget-text-editor\" data-id=\"3b81c76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Lastly, no firm is an island; it depends on numerous partners (whether official business partners or some other relationship), as demonstrated by the recent proliferation of supply chain issues affecting a wide range of industries.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">The security of software supply chains, or dependence on upstream libraries and other code used by businesses in their software, is a subject that is currently receiving a lot of attention, notably from the U.S. executive branch. However, it&#8217;s still debatably not getting the attention it merits. Third-party or supply chain risk management ranked last among the funding priorities for security, according to the aforementioned 2023 Global Tech Outlook report, with only 12% of survey respondents citing it as a major priority.<\/span><\/p><p>\u00a0<\/p><p><span style=\"font-weight: 400;\">Organisations have a duty to protect information and cooperate in managing larger network risks in near real-time.Organisations are responsible for protecting information and share a responsibility to respond and handle broader network threats in near real-time. This poses a significant risk to corporations as well as a demanding challenge. However, there is also a fantastic chance to increase and strengthen confidence for those firms that do this successfully.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25992db6 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"25992db6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c475f40\" data-id=\"6c475f40\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7dce24bb elementor-widget elementor-widget-heading\" data-id=\"7dce24bb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-large\">Four essential rules for fostering trust\n<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61e08a0a elementor-widget elementor-widget-text-editor\" data-id=\"61e08a0a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The four fundamental guidelines for fostering online trust are:<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-57aeb31c elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"57aeb31c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2847d2cc\" data-id=\"2847d2cc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-277f08fa elementor-widget elementor-widget-heading\" data-id=\"277f08fa\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prevention<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32016d2a elementor-widget elementor-widget-text-editor\" data-id=\"32016d2a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The first is to think of prevention as idealistic but occasionally unattainable. Mike Hughes, the Chief Information and Security Officer (CISO) at the outdoor store REI, is cited as advocating a belt-and-suspenders strategy. Organisations, he claimed, are rapidly &#8220;adding &#8216;detect and defend&#8217; to the motto of &#8216;prevent and protect. Together, the two approaches are effective. Organisations will always require a detect and defend programme in addition to preventative efforts because no prevention programme will ever be flawless.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-538cb7ad elementor-widget elementor-widget-heading\" data-id=\"538cb7ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Enablement<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f951667 elementor-widget elementor-widget-text-editor\" data-id=\"7f951667\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">A second concept views IT security differently from how development teams and others have traditionally perceived it\u2014as an enabler as opposed to a barrier. In order to provide customers and other stakeholders with a secure, seamless experience, a relationship between marketing (which typically decides what data to acquire) and cyber is necessary. By offering knowledge early in their processes, CISOs help data owners (CMO\/CXO and others) achieve their strategy safely and in compliance with the law.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79a3e9bc elementor-widget elementor-widget-heading\" data-id=\"79a3e9bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data collection<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-785f5752 elementor-widget elementor-widget-text-editor\" data-id=\"785f5752\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">The third question is related to data collection: What information are you gathering, what are you planning to do with it, and whether or not it is collected?<\/span><\/p><p><span style=\"font-weight: 400;\">This is a challenging location. Informing users does not mean a ten-page legal document meant to defend an organisation&#8217;s interests. Additionally, defaults are incredibly potent. \u201cOrganisations should detect this pattern and carefully examine opt-in and opt-out solutions\u201d, according to the study.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4572502 elementor-widget elementor-widget-heading\" data-id=\"4572502\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Human error<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-599e6f96 elementor-widget elementor-widget-text-editor\" data-id=\"599e6f96\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">People make mistakes. Therefore, you must account for human mistakes. Human mistakes exist in cyberspace, according to the authors. &#8220;While technology can play a significant role in lowering cyber risk, it is crucial and extremely difficult to address fundamental human problems. By implementing &#8220;best intent&#8221; defaults that give employees the freedom to complete their tasks with a low risk of exposing data in the incorrect locations, organisations may gain the trust of their workforce and encourage desirable behaviour, the authors continue.<\/span><\/p><p><span style=\"font-weight: 400;\">In the end, trust-building is a business necessity for firms. Cybersecurity, especially data protection, is far from the only aspect that affects how much your consumers trust you. Data breaches and other cybersecurity issues, however, have become standard fare for a reputable company due to increasingly sophisticated attacks, regulatory scrutiny, and increased customer awareness.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-296fc5f2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"296fc5f2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1324c695\" data-id=\"1324c695\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CXO UPDATES Why cybersecurity teams are central to organisational trust Trust is fundamentally based on cybersecurity. Cybersecurity teams play a vital role in creating trust across a spectrum of stakeholder groups. Customers and employees anticipate that their data will be protected and that their privacy will be respected. Investors and business partners demand a high [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":400,"comment_status":"open","ping_status":"open","sticky":false,"template":"elementor_canvas","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/206"}],"collection":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":8,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/206\/revisions"}],"predecessor-version":[{"id":529,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/posts\/206\/revisions\/529"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media\/400"}],"wp:attachment":[{"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/media?parent=206"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/categories?post=206"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cxo.exrtechsolutions.com\/index.php\/wp-json\/wp\/v2\/tags?post=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}