{"id":1962,"date":"2025-07-10T08:00:00","date_gmt":"2025-07-10T12:00:00","guid":{"rendered":"https:\/\/www.vernchilders.com\/?p=1962"},"modified":"2025-07-07T13:55:09","modified_gmt":"2025-07-07T17:55:09","slug":"the-human-firewall-for-cyber-security","status":"publish","type":"post","link":"https:\/\/www.vernchilders.com\/index.php\/2025\/07\/10\/the-human-firewall-for-cyber-security\/","title":{"rendered":"The Human Firewall for Cyber Security"},"content":{"rendered":"\n<p>Even with <strong>#AI<\/strong> in our corner, people remain the most critical part of a strong <strong>#CyberSecurity<\/strong> team. Phishing attacks, data breaches, and fraud and are all risks that target our organizations and the people who build them. The strongest defense depends on a well-trained and <strong>#CyberAware<\/strong> workforce. <strong>#HumanFireWall<\/strong> <strong>#ZeroTrust<\/strong> <strong>#CyberDefence<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.msn.com\/en-us\/news\/technology\/the-human-firewall-even-with-ai-humans-are-still-the-last-line-of-defense-in-cybersecurity\/ar-AA1HP8Dx?ocid=msedgntphdr&amp;cvid=2955f0456a034f2286195e6baf3b95b6&amp;ei=7\">https:\/\/www.msn.com\/en-us\/news\/technology\/the-human-firewall-even-with-ai-humans-are-still-the-last-line-of-defense-in-cybersecurity\/ar-AA1HP8Dx?ocid=msedgntphdr&amp;cvid=2955f0456a034f2286195e6baf3b95b6&amp;ei=7<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even with #AI in our corner, people remain the most critical part of a strong #CyberSecurity team. Phishing attacks, data breaches, and fraud and are all risks that target our organizations and the people who build them. The strongest defense depends on a well-trained and #CyberAware workforce. #HumanFireWall #ZeroTrust #CyberDefence https:\/\/www.msn.com\/en-us\/news\/technology\/the-human-firewall-even-with-ai-humans-are-still-the-last-line-of-defense-in-cybersecurity\/ar-AA1HP8Dx?ocid=msedgntphdr&amp;cvid=2955f0456a034f2286195e6baf3b95b6&amp;ei=7<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1962","post","type-post","status-publish","format-standard","hentry","category-cyber-security"],"_links":{"self":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/comments?post=1962"}],"version-history":[{"count":1,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1962\/revisions"}],"predecessor-version":[{"id":1963,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/posts\/1962\/revisions\/1963"}],"wp:attachment":[{"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/media?parent=1962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/categories?post=1962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.vernchilders.com\/index.php\/wp-json\/wp\/v2\/tags?post=1962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}