Discuss how human nature effects Access Control and what companies can do to reduce the risk. Your initial response is due by Thursday 11:59PM. It must be at least 250 words and have references. Your

Many of the errors that may arise in the organization's operations are mainly affected by human nature. Employees in the organization will make most of the cybersecurity issues or mistakes that bring major consequences. Despite secure solutions that can be adopted, employees in the organization will continue to make mistakes that may bring major risks. Most of the risks may come from sending secure information or data to incorrect emails or unauthorized users. This may happen knowingly or unknowingly. However, sending secure information accidentally will bring major risks. Even some times, employees will make unwanted access. This can allow unauthorized users to easily obtain risks. Later, they take complete control over the systems. The cost of breaches is mainly caused by human errors and their natures (Panwar et al., 2017).

To reduce the risks, organizations will choose certain strategies based on the extent of risks. The first need to develop an efficient plan with an idea to enhance the success factors and needs to reduce the risks. To reduce the risks, the first step that an organization should adopt is to identify the risks. In my view, this is the most critical step that an organization could face. Organizations should adopt to consider quality tests. This can offer them the need to offer a viable consequence and benefits of managing it. Implementing or adopting a policy at the company level will provide the guidelines in reducing the risks. They also help in guiding to mitigate the risks, this will reduce the extent of risks (Conteh & Schmick, 2016).

 

References

Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31.

Tourani, R., Misra, S., Mick, T., & Panwar, G. (2017). Security, privacy, and access control in information-centric networking: A survey. IEEE communications surveys & tutorials, 20(1), 566-600.