Skip to content
The Human Factor in the vulnerability management process
Graham SmithAug 8, 20244 min read

The Human Factor in the vulnerability management process

In the modern digital landscape, the vulnerability management process is often perceived as a purely technical endeavour that relies heavily on advanced tools, automated scanning, and timely patching. 

However, an equally crucial but often overlooked aspect is the human factor. Employees, IT professionals, and even developers can unintentionally introduce vulnerabilities through errors, misconfigurations, or a lack of awareness about best security practices. 

Addressing these human elements is essential for a robust and comprehensive vulnerability management strategy.

The role of social engineering and phishing

One of the most significant ways human behaviour can compromise security is through social engineering attacks, particularly phishing. Phishing attacks manipulate individuals into revealing sensitive information or installing malicious software, often bypassing sophisticated technical defences. 

According to the 2023 Verizon Data Breach Investigations Report, phishing was involved in 36%* of breaches, making it the most common form of social engineering attack. Despite technological advancements, these attacks remain effective because they exploit human psychology rather than technical vulnerabilities.

Organisations must prioritise employee training to mitigate the risks posed by phishing and social engineering. Regular, simulated phishing exercises can help employees recognise and respond appropriately to suspicious emails. This proactive approach is critical because, as the old adage goes, "A chain is only as strong as its weakest link," and in cybersecurity, that weak link is often a poorly trained employee.

The impact of misconfigurations

Misconfigurations in systems, networks, or software represent another major vulnerability that stems from human error. A study by IBM Security in 2023 found that misconfigurations accounted for nearly 16%** of all breaches, highlighting the significance of this issue. These errors often occur due to the complexity of modern IT environments, where numerous systems, platforms, and devices must be properly configured to maintain security.

"Misconfigurations are often overlooked because they're not always visible or easily detectable. It's like having a strong door but leaving the key under the mat. Regular audits and a thorough understanding of the systems in use are crucial to preventing these kinds of vulnerabilities."
Nathan Charles, Head of Sales & Account Management, OryxAlign

Organisations can address this by implementing strict configuration management protocols and regularly auditing their systems to ensure that all settings are optimised for security. Additionally, automated tools can assist in identifying misconfigurations, but the human oversight and understanding required to correct these issues are irreplaceable.

The challenge of patch management decisions

Patch management is a critical aspect of vulnerability management, but it's not just a technical process—it's a strategic decision-making challenge. IT teams must balance the urgency of applying security patches with the potential disruption to business operations. A 2022 study by the Ponemon Institute found that 57%*** of organisations delayed patching critical vulnerabilities because of concerns about potential disruptions, even though delaying patches increases the risk of exploitation.

This balancing act requires sound judgment and a deep understanding of technical and business implications of patching decisions. Nathan notes, "The decision to apply a patch immediately or delay it is not always straightforward. It requires careful consideration of the risk, the impact on operations, and the potential consequences of both actions. This is where human judgment is indispensable."

To improve patch management, organisations should develop clear policies that define when and how patches should be applied, considering security risks and business needs. Automated patch management tools can assist in this process, but human oversight is essential to make the right decisions.

Incident response preparedness

Even with the best vulnerability management practices, security incidents are inevitable. The speed and effectiveness of a response can significantly impact the outcome, and this is where the human factor plays a critical role. The 2023 IBM report discovered the average data breach cost is $4.45** million. Still, breaches identified and contained within 200 days cost an average of $1.23 million less than those that take longer to contain.

Nathan explains, "In the heat of an incident, the decisions made by your response team can make or break your defence. Preparation is key—regular drills, clear communication protocols, and a well-practised response plan can make all the difference."

Organisations should invest in regular incident response training, including simulations of different attack scenarios. This ensures that teams are prepared to act quickly and effectively when an incident occurs, minimising the potential damage.

Continuous education and training

The cybersecurity landscape is constantly evolving, with new threats emerging regularly. Continuous education and training are vital components of any vulnerability management program. A 2022 survey by (ISC)² found that 59% of cybersecurity professionals believe the lack of skilled personnel is a significant challenge in effectively managing vulnerabilities

Regular training helps keep teams up-to-date with the latest threats and best practices, ensuring they are well-equipped to handle new challenges.

Nathan concludes, "Technology is only as effective as the people who use it. Continuous education and real-world practice are non-negotiable in this field. The more prepared your team is, the better they can manage and mitigate vulnerabilities."

Summary of humans in the vulnerability management process

The vulnerability management process is not just about deploying the latest tools and technologies—it's also about managing and supporting the people who use them. By addressing the human factor through training, awareness, and decision-making support, organisations can enhance their vulnerability management programs and reduce the risk of human error leading to security breaches. 

Ultimately, the most advanced tools still require skilled and knowledgeable people to use them effectively, making the human factor an indispensable part of any cybersecurity strategy.


References

* Verizon Data Breach Investigations Report 2023: https://www.verizon.com/business/resources/reports/dbir/
** IBM Security 2023 Cost of a Data Breach Report: https://www.ibm.com/security/data-breach
*** Ponemon Institute 2022 Study on Patch Management: https://www.ponemon.org/
(ISC)² Cybersecurity Workforce Study 2022: https://www.isc2.org/Research/Workforce-Study

RELATED ARTICLES