Organisations invest heavily in advanced security systems but many still find themselves vulnerable to breaches and attacks. This raises a critical question: what is the weakest link in an organisation, humans or computers?

To explore this, let’s delve into the common vulnerabilities organisations face, the roles that both human factors and system weaknesses play, and how companies can mitigate these risks.
Understanding Common Vulnerabilities in Organisations
Before pinpointing the weakest link, it’s essential to understand the landscape of vulnerabilities that organisations typically encounter. These vulnerabilities can broadly be categorised into two types: human errors and system weaknesses.
- Human Error: According to a study by IBM, human error is responsible for 95% of cybersecurity breaches. This includes mistakes like clicking on malicious links, using weak passwords, or accidentally sending sensitive information to the wrong person. Such errors often stem from a lack of awareness or insufficient training, making employees an unintentional gateway for attackers.
- System Weaknesses: On the other hand, system vulnerabilities are the result of flaws or gaps in an organisation’s technological infrastructure. These could include outdated software, unpatched systems, or misconfigured settings. For example, the infamous WannaCry ransomware attack in 2017 exploited a vulnerability in Windows systems that had not been updated. The result? Over 200,000 computers across 150 countries were infected.
The Role of Human Factors in Organisational Vulnerabilities
One of the most famous cases illustrating the impact of human error on cybersecurity is the 2013 Target data breach. An employee at a third-party vendor fell for a phishing email, inadvertently allowing attackers to steal credentials and access Target’s network. The breach resulted in the theft of 40 million credit and debit card numbers and 70 million customer records, costing the company hundreds of millions in damages.

This incident highlights a key vulnerability: social engineering. Attackers often bypass technical defenses by targeting the people who use them. Social engineering tactics, such as phishing, pretexting, and baiting, rely on manipulating individuals into giving up sensitive information or access.
Insider threats also pose a significant risk. These can be intentional, such as a disgruntled employee stealing data, or unintentional, such as an employee accidentally sending sensitive information to the wrong person.According to a report by Verizon, 68% of breaches involve human internal actors.
The Impact of System Weaknesses on Organisational Security

While human error is a significant concern, system weaknesses can also provide attackers with an entry point. For instance, the Equifax data breach in 2017, one of the largest in history, was caused by an unpatched vulnerability in a web application framework. This allowed attackers to access sensitive information on 147 million people.
Outdated technology is a common culprit. Many organisations continue to rely on legacy systems that are no longer supported by vendors, meaning they don’t receive necessary security updates. These outdated systems can become easy targets for attackers.
Poor configuration is another issue. A simple misconfiguration, such as leaving a database open to the internet without proper authentication, can expose sensitive information to anyone who happens to find it. Misconfigurations are often overlooked but can lead to significant data breaches if not addressed.
Additionally, a lack of continuous monitoring can prevent organisations from detecting and responding to threats in real time. Without proper monitoring, suspicious activities may go unnoticed until it’s too late, as was the case in the Capital One data breach in 2019, where a misconfigured firewall allowed an attacker to access sensitive data unnoticed for several months.
So, what’s the weakest link in security, humans or systems? Many experts believe humans are the bigger risk because even if a system is highly secure, it can still be breached if people are tricked into making mistakes. But it’s not just one or the other; both need to be strong. Good technology can be weakened by poor user behavior, and even well-trained people can be let down by faulty systems. The key is to strengthen both people and technology to protect against attacks.
Mitigating Vulnerabilities: Strengthening Both Humans and Systems
To effectively mitigate vulnerabilities, organisations must take a holistic approach, addressing both human and system weaknesses.
- Comprehensive Training: Organisations should implement regular cybersecurity training programs to ensure that all employees are aware of potential threats and know how to respond. This includes training on recognizing phishing attempts, creating strong passwords, and following proper data handling procedures.
- Robust Systems: Ensuring that all systems are regularly updated, patched, and properly configured is crucial. Organisations should also consider conducting regular security audits to identify and address any vulnerabilities in their infrastructure.
- Zero Trust Approach: Adopting a Zero Trust security model, which assumes that threats can come from both inside and outside the organization, can help mitigate risks. This model involves verifying every access request as if it originates from an open network, thus reducing the chance of unauthorised access.
- Continuous Monitoring: Implementing continuous monitoring tools can help detect and respond to threats in real time, minimising the potential impact of a breach.