top of page

Humans as the Weakest Link: A Holistic Approach to Corporate Security

In our digital age, companies face many threats in the virtual space. While hardware and software may be equipped with the latest and most advanced technology, it is often the human element that is the weakest link in a company's security chain. How is it that humans constitute this vulnerability, and what can we do about it? To answer these questions, let's dive into a few real-life scenarios.

Imagine that you are an IT security manager in a large company. You've spent months updating your systems and training your employees on cybersecurity best practices. One day you get an alarming email: A security breach has occurred. A person has gained access to the company's sensitive data. But how? You've spent so much time and resources protecting your digital infrastructure.

After a thorough investigation, it turns out that the attacker did not penetrate the company's systems by exploiting a software bug or through a phishing attack. Instead, he has physical access to the building by following an employee in (also known as tailgating) and gaining access to an unencrypted system. Because no one wants to be that stupid person who doesn't hold the door for a "colleague" who comes with a big cardboard box. Be careful, you may not know the person, but it's also busy, so you can't know everyone and the person is probably new, so you better make sure that person feels welcome.

This scenario illustrates why humans are the weakest link in corporate security and emphasizes the importance of a holistic approach to security that goes beyond cyber security.

There are three main areas where the human factor becomes a weakness: lack of knowledge, manipulation, and lack of attention - both in the digital and physical space.

Lack of Knowledge

Many people are not aware of how cyber attacks work and how they can be prevented. Understanding concepts such as phishing, malware, ransomware, and social engineering can be a challenge for many without a technical background. It is therefore crucial to invest in education and training in cyber security to increase employee awareness and understanding.


Malicious actors use sophisticated techniques to manipulate people into performing actions or revealing sensitive information. Spear-phishing is an example of this, where the attacker pretends to be a trusted source to lure the victim into giving access to important data.

Lack of Attention

We live in a busy world where people often multitask. A moment of inattention can lead to catastrophic consequences, such as when an employee clicks on a malicious link in a spam email without realizing the danger.

But there is also another form of lack of attention that takes place in the physical space. It could be an employee who lets an unidentified person follow them into a building or an employee who leaves sensitive documents on a desk.

What can we do?

It is clear that companies must take a holistic approach to their security procedures.


Investment in ongoing training is essential. Employees must be kept up to date on the latest threats and how to protect themselves against them. Training must cover both digital security and physical security, including correct behavior in access control and safe handling of information.

Safety culture

Companies must create a culture that prioritizes safety. Security should be everyone's responsibility, not just the IT department's. When security becomes an integral part of the company culture, it becomes easier to handle and prevent security threats.

Technological Solutions

Using technological solutions can complement human knowledge and behaviour. Advanced security systems can help detect and prevent attacks, and technologies like two-factor authentication can add an extra layer of security.

It is clear that understanding and addressing the human factor is essential for corporate security. The human factor can be the weakest link, but with the right approach, it can also become the company's strongest defense. By taking a holistic approach to security that encompasses both the digital and physical space, companies can build a robust security culture that strengthens all links in the chain.

2 views0 comments

Recent Posts

See All

Red Teaming - The story

Red Teaming History Red teaming is a concept that has undergone a transformation over time, with influence in several different areas such as the military, cyber security and business. But where does


bottom of page