Further reading
Here are some resources that can be used to gain more knowledge on the topics covered in this chapter:
- Security posture: https://www.balbix.com/insights/what-is-cyber-security-posture/
- Human error in security breaches:
- Preventing insider security threats: https://searchsecurity.techtarget.com/feature/Ten-ways-to-prevent-insider-security-threats
- Human error and cybersecurity: https://thehackernews.com/2021/02/why-human-error-is-1-cyber-security.html
- How to Prevent Human Error: Top 4 Employee Cybersecurity Mistakes: https://www.ekransystem.com/en/blog/how-prevent-human-error-top-5-employee-cyber-security-mistakes
- Human error threats: https://nevadaitsolutions.com/prevent-human-error-threats/
- Data breaches: https://securitybrief.eu/story/more-than-half-of-personal-data-breaches-caused-by-human-error
- Job listing: https://www.bmc.com/blogs/it-job-listing/
- IAM: https://www.bmc.com/blogs/identity-access-management/
- The history of...