Human-centric Cybersecurity: The First Line of Defence
Posted: Monday, Dec 23

i 3 Table of Contents

Human-centric Cybersecurity: The First Line of Defence

Introduction

Australian organisations face an array of cybersecurity challenges that didnโ€™t exist half a decade ago.

And yet the reliance on traditional security and legacy systems is largely the status quo โ€“ often falling short in addressing the nuanced interplay between human behaviour and technological vulnerabilities.

A New Approach

Enter human-centric security โ€“ a fundamental first step to enhance the cyber security resilience of Australian companies. This forms part of the Skills component in a broader cybersecurity strategy that should include the five Sโ€™s: Stability, Security, Skills, Sustainability and Sovereignty.

What is Human-Centric Security?

While human-centric security isnโ€™t a solve-all solution in cyber resilience, it should play a fundamental role in the cybersecurity framework for all Aussie companies.

Human-centric security emphasises the integration of human behaviour, psychology, and interaction within cybersecurity frameworks. It recognises that individuals can be both the weakest link and the strongest defence โ€“ an approach that aligns security measures with human capabilities and limitations.

According to the Office of the Australian Information Commissioner’s (OAIC) Notifiable Data Breaches Report for January to June 2024, human error accounted for 30% of all reported data breaches during that period 1, a statistic that underscores the ongoing impact human error plays in cyber breaches.

Notable examples of the critical importance of human-centric security include the Latitude Financial Services Data Breach in March 2023 where approximately 14 million customers were impacted by a major data breach, compromising sensitive information including names, addresses and ID numbers initiated by the theft of a single employee’s security credentials 2. Whilst unauthorised access to the Western Sydney University systems occurred three times in 2024. The most recent in August saw a large amount of studentsโ€™ sensitive information leakedโ€”including names, addresses, tuition and enrolment data, and demographic dataโ€”after their Student Management System was accessed through a compromised IT account 3.

So how can companies strengthen their human-centric cybersecurity?

Strategies for Human-Centric Security

1. Behavioural Analysis and Training

Implementing regular training programs focusing on the psychological aspects of cyber threats can significantly reduce human error. Tailored workshops and simulations help employees recognise and respond to phishing attempts and social engineering tactics. Itโ€™s critical to ensure these are interactive, learning-orientated and focus on opening strong lines of communication around reporting mistakes and cyber threatsโ€“this ensures employees feel empowered to speak up when things go wrong, rather than embarrassed or reprimanded.

2. User-Centric Design

Designing security systems with user experience in mind ensures that security protocols are intuitive and less likely to be bypassed. Simplifying authentication processes using solutions such as passwordless logins and single-sign on, and providing clear guidelines can enhance compliance and reduce friction.

3. Continuous Engagement and Feedback

Establishing channels for employees to report security concerns and provide feedback fosters a culture of vigilance. Regular surveys and open forums encourage proactive participation in the organisation’s security posture.

4. Leadership and Governance

Strong leadership commitment to cybersecurity is crucial, from the top down. Allocating resources and setting clear policies demonstrate the organisation’s commitment to protecting data and systems, and embeds this into the very fibre of how you do things.

5. Experienced security partners

Seeking expert advice outside of the organisation helps uncover potential vulnerabilities and proactively creates safeguards against these. This is where having the right managed security partner on board is critical โ€“ helping advance the cyber maturity of the company beyond the internal resources available, and ensuring the latest solutions are utilised.

The future of Australian cybersecurity is human-centric

The Australian government’s recent introduction of new cybersecurity measures for critical sectors, including healthcare and finance, reflects a national commitment to safeguarding private data. These initiatives aim to replicate physical world protections in the digital space, emphasizing the need for a human-centric approach to security.

Integrating human-centric security strategies is vital for Australian organisations to remain cyber resilient now, and into the future. By focusing on human behaviour, user-centric design, continuous engagement, and strong governance, a robust defence against evolving cyber threats is possible.

Sources

1 Office of the Australian Information Commissioner’s (OAIC): www.oaic.gov.au/privacy/notifiable-data-breaches

2 Data breach cost Latitude $76 million | Information Age | ACS

3 University of Western Sydney: https://www.westernsydney.edu.au/news/public-notification

John Penn
John is the Security Propositions Architect for BT, where he is responsible for developing the go to market messaging for BTโ€™s global security portfolio. He also manages outreach partnerships for BT Australasia, working with universities and not for profits to promote cyber security education and female participation in STEM. John joined BT in 2011 and has held a number of roles including Showcase Manager, Head of Marketing, and Security Portfolio Manager.
Share This