{"id":22920,"date":"2024-04-05T17:12:41","date_gmt":"2024-04-05T10:12:41","guid":{"rendered":"https:\/\/www.smartdev.com\/?p=22920"},"modified":"2024-04-05T17:12:41","modified_gmt":"2024-04-05T10:12:41","slug":"how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/","title":{"rendered":"\uc778\uac04 \uc911\uc2ec\uc801 \uc811\uadfc \ubc29\uc2dd\uc774 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc758 \uaca9\ucc28\ub97c \ud574\uc18c\ud560 \uc218 \uc788\ub294 \ubc29\ubc95"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In an increasingly digital world, the importance of cybersecurity cannot be overstated. The rapid advancements in technology have given rise to complex cyber threats that can potentially disrupt businesses and compromise sensitive information. To bridge the gap in cybersecurity, a human-centric approach is crucial. By focusing on the people behind the technology, organisations can develop a more effective and robust defence system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To underscore this human-centric ethos, consider: A major, potentially worldwide security breach <\/span><a href=\"https:\/\/www.inc.com\/reuters\/the-cyberattack-stopped-by-a-microsoft-engineer-was-scarier-than-we-realize.html\"><span style=\"font-weight: 400;\">was stopped by a single engineer at Microsoft<\/span><\/a><span style=\"font-weight: 400;\"> who noticed a 500 millisecond lag in some software. Had the job been left to AI alone, who knows what would have happened. We still don\u2019t know the nature or origin of the attacker, but it\u2019s clear that whoever was behind it was incredibly sophisticated and spent years worming their way into a gap in cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So is cybersecurity a big deal? Absolutely. Should there be humans involved in cybersecurity oversight? Absolutely. The above story could have left backdoors in countless systems worldwide. What would\u2019ve happened afterwards? We\u2019ll never know, because one competent employee stopped it. Sometimes that\u2019s all it takes.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This isn\u2019t the first time something like this has happened: In 1983, a man named <\/span><a href=\"https:\/\/www.bbc.com\/news\/world-europe-24280831\"><span style=\"font-weight: 400;\">Stanislav Petrov prevented<\/span><\/a><span style=\"font-weight: 400;\"> what would have been a nuclear exchange by disregarding what he correctly assumed to be faulty information from his computer. So, while the idea of humans overriding computers is not new, the role software plays in our lives certainly has. That\u2019s why we still need people \u2014 and competent ones, at that.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_cybersecurity_gap\"><\/span><b>Understanding the cybersecurity gap<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So, how did it get this way? Cybersecurity has become a critical concern for organisations of all sizes and industries. The ever-evolving threat landscape poses significant challenges to businesses, making it essential to understand the cybersecurity gap. This gap refers to the disparity between the capabilities of cybercriminals and the defences put in place by organisations. While technology plays a vital role in protecting against cyber threats, it is not enough to close the gap entirely. Human discretion can catch things computers cannot.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here\u2019s a fun example: The human gut itself has on average <\/span><a href=\"https:\/\/www.healthline.com\/nutrition\/gut-brain-connection\"><span style=\"font-weight: 400;\">500 million neurons<\/span><\/a><span style=\"font-weight: 400;\">. That\u2019s the same as an octopus, which are remarkably clever animals. So, when you have a \u201cgut feeling\u201d or intuition, you may actually be onto something. Computers, on the other hand, do not have that advantage.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_role_of_human_behaviour_in_cybersecurity\"><\/span><b>The role of human behaviour in cybersecurity<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-22922 lazyload\" data-src=\"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280-1024x642.jpg\" alt=\"\" width=\"1024\" height=\"642\" data-srcset=\"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280-1024x642.jpg 1024w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280-300x188.jpg 300w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280-768x481.jpg 768w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280-18x12.jpg 18w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/internet-3484137_1280.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/642;\" \/><\/p>\n<p><span style=\"font-weight: 400;\">So what does this look like in practice? A human-centric approach means recognizing that human behaviour plays a significant role in cybersecurity. It involves understanding the motivations and intentions of cybercriminals, as well as the vulnerabilities and behaviours of employees and end-users. By understanding these factors, organisations can develop more effective strategies to protect against cyber threats. We still rely on human detectives to catch criminals, and we must still rely on human engineers to prevent cyberattacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Human behaviour can be both a strength and a weakness when it comes to cybersecurity. On one hand, employees and end-users can be the first line of defence, detecting and reporting suspicious activities. On the other hand, they can also be the weakest link, inadvertently falling victim to social engineering attacks or unintentionally compromising sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best situation is to sync the abilities of both humans and software to get the best result. This is likely what the future will look like. Anyone who thinks humans are going obsolete is missing something crucial. But the same can be said for anyone who thinks a human can do their job without all the best tools available.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_limitations_of_technology_in_bridging_the_cybersecurity_gap\"><\/span><b>The limitations of technology in bridging the cybersecurity gap<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While technology is essential in mitigating cyber threats, it has its limitations. Cybercriminals are constantly finding new ways to exploit vulnerabilities in systems and software. No matter how advanced the technology, there will always be a possibility of new and unknown threats. This is where the human-centric approach becomes crucial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Technology alone cannot bridge the cybersecurity gap. It requires a combination of technical solutions, employee education, and a culture of security to effectively protect against cyber threats. By addressing the human element, organisations can significantly enhance their cybersecurity defences. It\u2019s not always pure technical talent that allows people to play their role in the scenario, either: It\u2019s simply their human-ness. People understand other people better than machines do. At least for now, that is.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Human-centric_cybersecurity_strategies_and_best_practices\"><\/span><b>Human-centric cybersecurity strategies and best practices<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Implementing a human-centric approach to cybersecurity involves several strategies and best practices. One of the key aspects is employee education and training. Employees need to be aware of the potential risks and threats they may encounter and be equipped with the knowledge and skills to identify and respond to them effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Building a culture of cybersecurity awareness is also essential. This involves creating an environment where security is a shared responsibility, from the top leadership to every employee. Regular communication, training sessions, and reminders can help reinforce the importance of cybersecurity and ensure that it remains a top priority.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s critical that communication is a two-way street, where employees are empowered to speak up and alert their managers of problems \u2014 with the assumption the manager will actually listen. This is something we strive hard to achieve at SmartDev, and we think we\u2019re doing a pretty good job of it.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_importance_of_employee_education_and_training\"><\/span><b>The importance of employee education and training<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Employee education and training are fundamental elements of a human-centric approach to cybersecurity. By providing employees with the necessary knowledge and skills, organisations can empower them to be active participants in safeguarding against cyber threats.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Training should cover a range of topics, including recognizing phishing emails, creating strong passwords, and identifying suspicious activities. It should also include regular updates on emerging threats and best practices for staying safe online. By investing in employee education and training, organisations can significantly reduce the risk of insider threats and social engineering attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But there\u2019s also a <\/span><i><span style=\"font-weight: 400;\">je ne sais quoi<\/span><\/i><span style=\"font-weight: 400;\"> of teaching employees to keep their eyes open and trust their instincts. Training only goes so far \u2014 experience and instinct play just as much of a role as formal training.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Building_a_culture_of_cybersecurity_awareness\"><\/span><b>Building a culture of cybersecurity awareness<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-22923 lazyload\" data-src=\"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280-1024x640.jpg\" alt=\"\" width=\"1024\" height=\"640\" data-srcset=\"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280-1024x640.jpg 1024w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280-300x188.jpg 300w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280-768x480.jpg 768w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280-18x12.jpg 18w, https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/security-4868162_1280.jpg 1280w\" data-sizes=\"(max-width: 1024px) 100vw, 1024px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/640;\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Creating a culture of cybersecurity awareness is crucial for the success of a human-centric approach. This involves instilling a sense of responsibility and ownership among employees when it comes to protecting sensitive information.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Leadership plays a vital role in promoting a culture of cybersecurity awareness. By setting an example and demonstrating a commitment to security, leaders can inspire employees to prioritise cybersecurity in their daily activities. Regular communication and engagement with employees can help reinforce the importance of cybersecurity and encourage a proactive approach to protecting against cyber threats. A sense of trust between manager and employee is key, as we\u2019ve discussed above.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_role_of_leadership_in_promoting_a_human-centric_approach\"><\/span><b>The role of leadership in promoting a human-centric approach<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Leadership plays a crucial role in promoting a human-centric approach to cybersecurity. By championing the importance of cybersecurity and providing the necessary resources, leaders can create an environment where security is a top priority.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Leaders should lead by example, demonstrating their commitment to cybersecurity through their actions and decisions. This includes allocating resources for training and education, regularly reviewing and updating security policies, and fostering a culture of open communication and collaboration.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Case_studies_of_successful_human-centric_cybersecurity_initiatives\"><\/span><b>Case studies of successful human-centric cybersecurity initiatives<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many organisations have successfully implemented human-centric cybersecurity initiatives. These initiatives have demonstrated the effectiveness of focusing on the human element in bridging the cybersecurity gap.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve worked with multiple clients on this topic, with which we\u2019ve signed NDA agreements \u2014 so unfortunately we can\u2019t share the details. However, our approach towards cybersecurity has proved robust and fits our human-first ethos which we aim to share with our clients.\u00a0<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Embracing_a_human-centric_approach_for_stronger_cybersecurity\"><\/span><b>Embracing a human-centric approach for stronger cybersecurity<\/b><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In conclusion, a human-centric approach is crucial for bridging the gap in cybersecurity. By prioritising the human element and focusing on the behaviours and vulnerabilities of employees and end-users, organisations can develop more effective and robust defence systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While technology is essential, it has its limitations. Cybercriminals are constantly finding new ways to exploit vulnerabilities, making it necessary to address the human element to effectively protect against cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By implementing strategies such as employee education and training, building a culture of cybersecurity awareness, and promoting a human-centric approach from leadership, organisations can significantly enhance their cybersecurity defences. Embracing a human-centric approach is key to ensuring stronger cybersecurity in an increasingly digital world.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re looking to strengthen your cybersecurity or be advised on how to do so, <\/span><a href=\"https:\/\/smartdev.com\/kr\/get-started\/\"><span style=\"font-weight: 400;\">reach out to us for a free consultation<\/span><\/a><span style=\"font-weight: 400;\">. We\u2019ll be happy to discuss the newest ways to manage cybersecurity as well as the oldest: a good old-fashioned human. A competent one, too. We\u2019ve got those and are always looking for more.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>In an increasingly digital world, the importance of cybersecurity cannot be overstated. The rapid advancements&#8230;<\/p>","protected":false},"author":13,"featured_media":22921,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[51,49],"tags":[],"class_list":{"0":"post-22920","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-partnerships","8":"category-technology"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev\" \/>\n<meta property=\"og:description\" content=\"In an increasingly digital world, the importance of cybersecurity cannot be overstated. The rapid advancements...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"SmartDev\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.youtube.com\/@smartdevllc\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-05T10:12:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linh Chu Dieu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@smartdevllc\" \/>\n<meta name=\"twitter:site\" content=\"@smartdevllc\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linh Chu Dieu\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/\"},\"author\":{\"name\":\"Linh Chu Dieu\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/person\\\/b22ea0c191699584b144123a20f542a2\"},\"headline\":\"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity\",\"datePublished\":\"2024-04-05T10:12:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/\"},\"wordCount\":1479,\"publisher\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cyber-4610993_1280.jpg\",\"articleSection\":[\"Partnerships\",\"Technology\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/\",\"name\":\"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cyber-4610993_1280.jpg\",\"datePublished\":\"2024-04-05T10:12:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cyber-4610993_1280.jpg\",\"contentUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/cyber-4610993_1280.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/smartdev.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#website\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/\",\"name\":\"SmartDev\",\"description\":\"Al Powered Software Development\",\"publisher\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#organization\"},\"alternateName\":\"SmartDev\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#organization\",\"name\":\"SmartDev\",\"alternateName\":\"SmartDev\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/SMD-Logo-New-Main-scaled.png\",\"contentUrl\":\"https:\\\/\\\/smartdev.com\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/SMD-Logo-New-Main-scaled.png\",\"width\":2560,\"height\":550,\"caption\":\"SmartDev\"},\"image\":{\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.youtube.com\\\/@smartdevllc\",\"https:\\\/\\\/x.com\\\/smartdevllc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4873071\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/#\\\/schema\\\/person\\\/b22ea0c191699584b144123a20f542a2\",\"name\":\"Linh Chu Dieu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g\",\"caption\":\"Linh Chu Dieu\"},\"description\":\"Linh, a valuable member of our marketing team, joined SmartDev in July 2023. With a rich background working for several multinational companies, she brings a wealth of experience to our team. Linh is not only passionate about digital transformation but also eager to share her knowledge with those who share a similar interest in technology. Her enthusiasm and expertise make her an integral part of our team at SmartDev.\",\"url\":\"https:\\\/\\\/smartdev.com\\\/kr\\\/author\\\/linh-chudieu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/","og_locale":"ko_KR","og_type":"article","og_title":"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev","og_description":"In an increasingly digital world, the importance of cybersecurity cannot be overstated. The rapid advancements...","og_url":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/","og_site_name":"SmartDev","article_publisher":"https:\/\/www.youtube.com\/@smartdevllc","article_published_time":"2024-04-05T10:12:41+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg","type":"image\/jpeg"}],"author":"Linh Chu Dieu","twitter_card":"summary_large_image","twitter_creator":"@smartdevllc","twitter_site":"@smartdevllc","twitter_misc":{"\uae00\uc4f4\uc774":"Linh Chu Dieu","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/"},"author":{"name":"Linh Chu Dieu","@id":"https:\/\/smartdev.com\/kr\/#\/schema\/person\/b22ea0c191699584b144123a20f542a2"},"headline":"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity","datePublished":"2024-04-05T10:12:41+00:00","mainEntityOfPage":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/"},"wordCount":1479,"publisher":{"@id":"https:\/\/smartdev.com\/kr\/#organization"},"image":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg","articleSection":["Partnerships","Technology"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/","url":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/","name":"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity | SmartDev","isPartOf":{"@id":"https:\/\/smartdev.com\/kr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg","datePublished":"2024-04-05T10:12:41+00:00","breadcrumb":{"@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#primaryimage","url":"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg","contentUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2024\/04\/cyber-4610993_1280.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/smartdev.com\/kr\/how-a-human-centric-approach-can-bridge-the-gap-in-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/smartdev.com\/"},{"@type":"ListItem","position":2,"name":"How a Human-Centric Approach Can Bridge the Gap in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/smartdev.com\/kr\/#website","url":"https:\/\/smartdev.com\/kr\/","name":"\uc2a4\ub9c8\ud2b8\ub370\ube0c","description":"AI \uae30\ubc18 \uc18c\ud504\ud2b8\uc6e8\uc5b4 \uac1c\ubc1c","publisher":{"@id":"https:\/\/smartdev.com\/kr\/#organization"},"alternateName":"SmartDev","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/smartdev.com\/kr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/smartdev.com\/kr\/#organization","name":"\uc2a4\ub9c8\ud2b8\ub370\ube0c","alternateName":"SmartDev","url":"https:\/\/smartdev.com\/kr\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/smartdev.com\/kr\/#\/schema\/logo\/image\/","url":"https:\/\/smartdev.com\/wp-content\/uploads\/2025\/04\/SMD-Logo-New-Main-scaled.png","contentUrl":"https:\/\/smartdev.com\/wp-content\/uploads\/2025\/04\/SMD-Logo-New-Main-scaled.png","width":2560,"height":550,"caption":"SmartDev"},"image":{"@id":"https:\/\/smartdev.com\/kr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.youtube.com\/@smartdevllc","https:\/\/x.com\/smartdevllc","https:\/\/www.linkedin.com\/company\/4873071\/"]},{"@type":"Person","@id":"https:\/\/smartdev.com\/kr\/#\/schema\/person\/b22ea0c191699584b144123a20f542a2","name":"\ub9b0 \ucd94 \ub514\uc5d0\uc6b0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/secure.gravatar.com\/avatar\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/511d57deaf6649acb09f6d1556e45663ed7a48a48a0ed54b6a00699dce5aa0cb?s=96&d=mm&r=g","caption":"Linh Chu Dieu"},"description":"\ub9c8\ucf00\ud305 \ud300\uc758 \uc18c\uc911\ud55c \uba64\ubc84\uc778 \ub9b0\uc740 2023\ub144 7\uc6d4 SmartDev\uc5d0 \ud569\ub958\ud588\uc2b5\ub2c8\ub2e4. \uc5ec\ub7ec \ub2e4\uad6d\uc801 \uae30\uc5c5\uc5d0\uc11c \uadfc\ubb34\ud558\uba70 \uc313\uc740 \ud48d\ubd80\ud55c \uacbd\ud5d8\uc744 \ubc14\ud0d5\uc73c\ub85c \ud300\uc5d0 \uae30\uc5ec\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4. \ub9b0\uc740 \ub514\uc9c0\ud138 \ud601\uc2e0\uc5d0 \ub300\ud55c \uc5f4\uc815\ubfd0\ub9cc \uc544\ub2c8\ub77c, \uae30\uc220\uc5d0 \ub300\ud55c \uac19\uc740 \uad00\uc2ec\uc0ac\ub97c \uac00\uc9c4 \uc0ac\ub78c\ub4e4\uacfc \uc9c0\uc2dd\uc744 \uacf5\uc720\ud558\uace0\uc790 \ud558\ub294 \uc5f4\uc815\ub3c4 \uac00\uc9c0\uace0 \uc788\uc2b5\ub2c8\ub2e4. \uadf8\ub140\uc758 \uc5f4\uc815\uacfc \uc804\ubb38\uc131\uc740 SmartDev \ud300\uc758 \ud575\uc2ec \uad6c\uc131\uc6d0\uc73c\ub85c \uc790\ub9ac\ub9e4\uae40\ud588\uc2b5\ub2c8\ub2e4.","url":"https:\/\/smartdev.com\/kr\/author\/linh-chudieu\/"}]}},"_links":{"self":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/posts\/22920","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/comments?post=22920"}],"version-history":[{"count":0,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/posts\/22920\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/media\/22921"}],"wp:attachment":[{"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/media?parent=22920"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/categories?post=22920"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/smartdev.com\/kr\/wp-json\/wp\/v2\/tags?post=22920"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}