Table of contents
Editor's note:
Most heist movies go like this. It starts with a bank, which is the target. At first, it seems impossible to penetrate. Cameras sweep the lobby, guards rotate through every doorway, alarms connect straight to the police, and the vault looks like it could survive a grade 10 earthquake. On the surface, there are no cracks. The turning point never comes from smashing through. It’s usually when someone on the inside gets distracted; a guard trusts the wrong person, or an employee unknowingly hands over a keycard through social engineering.
While it’s entertaining, that’s not just storytelling. It’s how many real breaches unfold. Attackers rarely waste energy battling your advanced security systems when it is far easier to target the people who use them. One click on a convincing email, one careless password, one rushed response, and the defences are down.
When most people think of cybersecurity, they picture multiple layers of software, firewalls, and monitoring systems working around the clock. Those tools are powerful, and they stop countless attacks every day. But criminals know that the fastest way in is rarely smashing through the doors. It is through the people who already have the keys.
But the good news is that you and everyone in your organisation do not have to be the weak spot. With the right awareness and everyday habits, you and everyone in your business can become the first and strongest line of defence.
Why are people vulnerable?
People are not vulnerable because they are careless. They’re vulnerable because attackers use social engineering tactics that manipulate human psychology instead of targeting software flaws.
According to Verizon’s 2024 Data Breach Investigation Report, 68% of breaches involve a human element. Unlike firewalls or encryption, people bring instincts, habits, and emotions to the table. Those qualities help us collaborate and move quickly at work, yet they also create gaps that criminals are skilled at exploiting. If technology is built to keep attackers out, why do people so often become the entry point? The answer lies in the way humans think, work, and make decisions under pressure.
Here are three of the biggest reasons.
Trust and routine
Humans are wired to trust, especially when something looks familiar. When an email seems to come from a boss, a colleague, or a well-known brand, suspicion is rarely the first reaction. Attackers mimic those signals to slip past our defences. One striking example came from Ubiquiti Networks, where scammers posing as executives tricked an employee into wiring $46.7 million. The attackers didn’t hack a system; they hacked trust.
Urgency and fear
Attackers also know how to press emotional buttons. A message warning that an account has been compromised or demanding immediate action is designed to spark panic. Once fear takes over, rational thinking gives way to reaction. Clicking a link or entering credentials in a hurry can hand over access before the brain has time to process the risk.
Distraction and pressure
Security mistakes often happen in the middle of a busy day. Between deadlines, meetings, and endless notifications, it is easy to approve a request or click a link just to move it off the screen. In those moments of divided attention, attackers find their best chances. A single lapse of focus can unravel even the most expensive defences.
Common mistakes people make that cause breaches
These are everyday mistakes that slip under the radar that attackers use to breach companies.
- Weak or reused passwords – People often recycle simple passwords across accounts. Once attackers get one, they can unlock many systems.
- Ignoring software updates – Skipping patches leaves devices exposed to vulnerabilities that criminals already know how to exploit.
- Falling for phishing attempts – Clicking suspicious links or downloading fake attachments remains a leading cause of breaches.
- Using public Wi-Fi carelessly – Logging into work accounts or handling sensitive data on open networks makes it easy for attackers to intercept information.
- Oversharing on social media – Details like birthdays, job roles, or location check-ins help criminals guess passwords or craft convincing scams
Real-world incidents caused by human error
- Twitter Bitcoin hack: In 2020, Twitter confirmed that attackers gained access to internal systems by targeting employees in a coordinated social engineering campaign. Once inside, they hijacked high-profile accounts including Barack Obama, Elon Musk, and Apple to promote a Bitcoin scam. It was not a flaw in Twitter’s code that caused the breach, but employees who were tricked into granting access.
- Google (Salesforce CRM breach): Attackers posing as internal IT support used voice phishing (vishing) to persuade Google employees to authorise a malicious application disguised as Salesforce’s Data Loader tool. In reality, it was malicious software. By gaining that small foothold, the attackers were able to extract about 2.5 million business contact records. Payment information was not compromised, but the breach proved how effective social engineering can be even against one of the most secure companies in the world.
- Workday incident: Workday, a global HR and finance software provider, also disclosed that a social engineering campaign hit it. Attackers masqueraded as trusted parties to coax employees into revealing access details. The result was unauthorised access to names, phone numbers, and emails. The company stressed that its core systems were not technically breached. What failed was the human response to a convincing attacker.
How you can become a human firewall
Technology can block threats, but people decide whether an attack succeeds. Becoming a human firewall is about building smart habits and creating a culture where security is simple and natural. Here are seven ways to make that shift.
1. Pause before you click
Cybercriminals like to create urgency. If a message pressures you to act fast, stop and look again. A few extra seconds of caution can prevent a costly mistake. It’s better to be wrong about an attack than to cause a breach that can leave you exposed.
2. Secure your accounts
Strong, unique passwords are a must, and multi-factor authentication adds a critical safety net. Password managers make it easier to use complex logins without the hassle of remembering them all.
3. Keep systems updated and simple
Updates close known vulnerabilities, and automatic updates remove the temptation to delay them. Tools like VPNs for remote work should be straightforward to use. The easier security is, the more likely people are to follow it.
4. Be careful on public WiFi
Open networks make it easy for attackers to intercept data. Avoid logging into sensitive accounts unless you are on a secure connection or using a trusted VPN.
5. Watch what you share
Personal details such as birthdays, job roles, or travel plans can be used to guess passwords or create convincing scams. Think twice before posting what could be used against you.
6. Verify unusual requests
If your boss asks for a transfer or IT requests for your login, confirm through another trusted channel, like a voice call, before acting. Attackers often rely on authority to push people into quick decisions.
7. Report quickly
Mistakes can happen, but what matters the most is fast reporting. Organisations that encourage people to speak up without fear can stop minor incidents from turning into full-blown breaches. Training, practice drills, and supportive guidance make reporting a regular part of the routine.
Conclusion
Cybersecurity has always been shaped by technology, but in the end, it comes down to people. Attackers know that firewalls and encryption are hard to break, while human behaviour is easier to influence. That is why the majority of breaches start with a click, a slip, or a moment of misplaced trust.
The tools matter, but they cannot do the job alone. The real difference comes when people understand the role they play and feel empowered to make smarter choices. With awareness, practice, and the right culture, the human element shifts from being the weak spot to being the strongest defence.