{"id":4329,"date":"2025-12-01T07:33:00","date_gmt":"2025-12-01T06:33:00","guid":{"rendered":"https:\/\/enthec.com\/?p=4329"},"modified":"2025-12-01T07:33:00","modified_gmt":"2025-12-01T06:33:00","slug":"cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection","status":"publish","type":"post","link":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/","title":{"rendered":"Cybersecurity and the human factor: the most common mistake in digital protection"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cybersecurity is one of those issues we all know we should be taking care of, but we keep putting it off. Updating passwords, checking permissions, verifying links\u2026 These are simple tasks, yes, but they&#8217;re often overlooked. And that&#8217;s precisely the root of the problem:   <\/span><b>In cybersecurity, the human factor remains the weakest link<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This isn&#8217;t about blaming anyone, but about acknowledging an apparent reality. Human error is, currently, the most common cause of digital incidents. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In recent years, the rise of remote work, the fast pace of life, and the daily use of connected devices have made this vulnerability even more pronounced. And if we think about it for a moment, it makes sense: an impulsive click or a weak password can open the door to problems that cost time, money, and reputation. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Before moving on, it&#8217;s worth introducing a tool that&#8217;s helping to reduce this exposure in the daily lives of all users: Qondar, Enthec&#8217;s cyber-surveillance solution for individuals. Qondar is a key component of Continuous Threat Exposure Management, providing timely warnings about data breaches, password leaks, and other risks that directly affect a person&#8217;s digital life. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Understanding the relationship between cybersecurity and the human factor<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The expression \u201ccybersecurity and the human factor\u201d encompasses a straightforward idea:<\/span> <b>Digital security does not depend solely on systems, firewalls, or artificial intelligence,<\/b><span style=\"font-weight: 400;\">but also on how we use technology. Companies can invest in advanced tools, but they&#8217;re of little use if an employee falls for a  <\/span><a href=\"https:\/\/enthec.com\/en\/phishing-what-is-it-and-how-many-types-are-there\/\"><span style=\"font-weight: 400;\">phishing email<\/span><\/a> <span style=\"font-weight: 400;\">or unintentionally shares sensitive information.<\/span><\/p>\n<h3><b>Why do we keep failing at the same things?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Several reasons explain this phenomenon:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Information overload. <\/b><span style=\"font-weight: 400;\">We live surrounded by notifications and simultaneous tasks. In that pace, double-checking a suspicious email isn&#8217;t always a priority. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Overconfidence. <\/b><span style=\"font-weight: 400;\">In both our professional and personal lives, we often think, &#8220;It won&#8217;t happen to us.&#8221; But no one is safe: neither individuals nor companies. <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Lack of ongoing training. <\/b><span style=\"font-weight: 400;\">Many attacks evolve so rapidly that what we knew a year ago is no longer sufficient. And this is where the CTEM concept comes into play. <\/span><\/li>\n<\/ol>\n<p style=\"text-align: center;\"><img decoding=\"async\" class=\"alignnone size-full wp-image-4316\" src=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/ciberseguridad-factor-humano.jpg\" alt=\"cybersecurity and the human factor\" width=\"575\" height=\"355\" srcset=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/ciberseguridad-factor-humano.jpg 575w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/ciberseguridad-factor-humano-300x185.jpg 300w, https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/ciberseguridad-factor-humano-350x216.jpg 350w\" sizes=\"(max-width: 575px) 100vw, 575px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2><b>The importance of Continuous Threat Exposure Management (CTEM)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybersecurity can no longer be viewed as a one-off project. It&#8217;s not enough to conduct a single audit and assume everything is under control. Threats evolve. Data moves. And attackers refine their techniques.    <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Continuous Threat Exposure Management (CTEM) seeks precisely this:<\/span> <b>to constantly monitor which vulnerabilities we have and which risks are active at any given time. <\/b><span style=\"font-weight: 400;\">. It&#8217;s not just about reacting, but about detecting before the damage occurs.<\/span><\/p>\n<h3><b>What does CTEM contribute to the field of human factors?<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Constant visibility: <\/b><span style=\"font-weight: 400;\">allows you to see if leaked credentials, breaches, or risk signals associated with common errors have appeared.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Realistic prioritization:<\/b><span style=\"font-weight: 400;\"> It helps determine which vulnerabilities require immediate attention and which do not.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data-based prevention: <\/b><span style=\"font-weight: 400;\">The sooner a problem is identified, the easier it is to correct.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">This is where solutions like Kartos (for businesses) and Qondar (for individuals) play an instrumental role. Both allow this continuous exposure approach to be implemented without complex processes or specialized equipment. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Most frequent human errors in cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Below are some of the most common mistakes in both the business and personal spheres. All of them are directly related to cybersecurity and the human factor, and many could be avoided with minimal monitoring or training. <\/span><\/p>\n<h3><b>1. Reusing passwords<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A classic. According to a NordPass study, most users still reuse the same password across more than 10 different services. If one of those platforms suffers a data breach, they are all exposed.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">You may be interested in\u2192<\/span> <a href=\"https:\/\/enthec.com\/en\/?p=3017\"><span style=\"font-weight: 400;\">How to manage business passwords and credentials easily and securely to avoid online threats<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>2. Falling for fraudulent emails or messages<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing is becoming increasingly sophisticated. Many attacks perfectly mimic well-known companies, banks, or even coworkers.  <\/span><b>An innocent click can compromise the entire device<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>3. Underestimating \u201charmless\u201d information<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Sometimes we share seemingly irrelevant data: a photo with location, a personal email on a website without HTTPS, an automatic response on vacation\u2026 All of that can be useful to an attacker.<\/span><\/p>\n<h3><b>4. Trusting open Wi-Fi networks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Having a coffee while we work is tempting, but connecting to an open network can expose sensitive information to third parties.<\/span><\/p>\n<h3><b>5. Failure to monitor personal data leaks<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Many users are unaware whether their credentials have been exposed on forums, in leaked databases, or on the dark web. This lack of control fuels risks that accumulate without us even realizing it. <\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>How to reduce human vulnerability: habits and tools<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The good news is that improving cybersecurity and the human factor doesn&#8217;t require being an engineer or dedicating hours every week. Often, simple measures are enough. <\/span><\/p>\n<h3><b>Basic digital hygiene<\/b><\/h3>\n<ul>\n<li aria-level=\"1\"><b>Use unique and strong passwords.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Activate two-step verification.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Be wary of unsolicited links or files.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Review application permissions.<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Keep systems updated.<\/b><\/li>\n<\/ul>\n<h3><b>Continuing education in companies<\/p>\n<p><\/b><\/h3>\n<p><span style=\"font-weight: 400;\">It&#8217;s not just about giving an annual talk. Organizations that reduce incidents typically implement short, dynamic, and frequent training sessions. Even small reminders have a real impact.  <\/span><\/p>\n<h3><b>Cyber \u200b\u200bsurveillance for individuals<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This is where Qondar comes in, designed so that anyone can:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Find out if passwords have been leaked.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect digital identity theft.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor mentions or data in high-risk areas.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Receive clear and actionable notifications.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">It&#8217;s a simple way to effortlessly integrate the CTEM mindset into your daily routine, helping to make the human factor no longer a permanent problem.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Technology helps, but the responsibility is shared.<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Although tools like Kartos or Qondar facilitate risk management, cybersecurity remains a shared responsibility. <\/span><b>The sum of human behavior and technological surveillance<\/b> <span style=\"font-weight: 400;\">is what truly builds a safe environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key is to create a culture where asking questions, checking, and being skeptical are the norm, not the exception, where it&#8217;s understood that a mistake isn&#8217;t a personal failing, but a reminder that we are all vulnerable. <\/span><\/p>\n<p><b>The relationship between cybersecurity and the human factor is undeniable.<\/b> <span style=\"font-weight: 400;\">As long as distractions, overconfidence, and a lack of <\/span><a href=\"https:\/\/enthec.com\/en\/9-healthy-digital-habits-that-will-protect-you-from-identity-theft-and-leaks\/\"><span style=\"font-weight: 400;\">healthy digital habits<\/span><\/a><span style=\"font-weight: 400;\">exist, incidents that could have been avoided will continue to occur. That&#8217;s why it&#8217;s so important to integrate continuous monitoring at both the company and individual levels. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to improve your<\/span> <a href=\"https:\/\/enthec.com\/en\/importance-of-personal-privacy-in-the-digital-age\/\"><span style=\"font-weight: 400;\">personal protection,<\/span><\/a><span style=\"font-weight: 400;\">whether it&#8217;s your own data or that of your close circle, Qondar is an accessible, practical option that lets you see what&#8217;s happening with your data in real time. Discover our tool and start controlling your digital exposure today. More conscious cybersecurity is just a step away.  <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is one of those issues we all know we should be taking care of, but we keep putting it [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4320,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[24,78],"class_list":["post-4329","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","tag-cybersecurity","tag-prevention"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u25b7 Cybersecurity and the human factor [WARNING] | Enthec<\/title>\n<meta name=\"description\" content=\"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u25b7 Cybersecurity and the human factor [WARNING] | Enthec\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"ENTHEC \u00b7 Kartos \u00b7 Qondar\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-01T06:33:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"7952\" \/>\n\t<meta property=\"og:image:height\" content=\"5304\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Enthec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Enthec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\"},\"author\":{\"name\":\"Enthec\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\"},\"headline\":\"Cybersecurity and the human factor: the most common mistake in digital protection\",\"datePublished\":\"2025-12-01T06:33:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\"},\"wordCount\":1098,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg\",\"keywords\":[\"Cybersecurity\",\"Prevention\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\",\"url\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\",\"name\":\"\u25b7 Cybersecurity and the human factor [WARNING] | Enthec\",\"isPartOf\":{\"@id\":\"https:\/\/enthec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg\",\"datePublished\":\"2025-12-01T06:33:00+00:00\",\"description\":\"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits\",\"breadcrumb\":{\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg\",\"width\":7952,\"height\":5304,\"caption\":\"El factor Humano en Ciberseguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/enthec.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity and the human factor: the most common mistake in digital protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/enthec.com\/#website\",\"url\":\"https:\/\/enthec.com\/\",\"name\":\"ENTHEC\",\"description\":\"Advanced AI-driven Cyber-Surveillance Platform\",\"publisher\":{\"@id\":\"https:\/\/enthec.com\/#organization\"},\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/enthec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/enthec.com\/#organization\",\"name\":\"ENTHEC\",\"alternateName\":\"ENTHEC \u00b7 Kartos \u00b7 Qondar\",\"url\":\"https:\/\/enthec.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"contentUrl\":\"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png\",\"width\":667,\"height\":131,\"caption\":\"ENTHEC\"},\"image\":{\"@id\":\"https:\/\/enthec.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1\",\"name\":\"Enthec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g\",\"caption\":\"Enthec\"},\"url\":\"https:\/\/enthec.com\/en\/author\/enthec\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u25b7 Cybersecurity and the human factor [WARNING] | Enthec","description":"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/","og_locale":"en_US","og_type":"article","og_title":"\u25b7 Cybersecurity and the human factor [WARNING] | Enthec","og_description":"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits","og_url":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/","og_site_name":"ENTHEC \u00b7 Kartos \u00b7 Qondar","article_published_time":"2025-12-01T06:33:00+00:00","og_image":[{"width":7952,"height":5304,"url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg","type":"image\/jpeg"}],"author":"Enthec","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Enthec","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#article","isPartOf":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/"},"author":{"name":"Enthec","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1"},"headline":"Cybersecurity and the human factor: the most common mistake in digital protection","datePublished":"2025-12-01T06:33:00+00:00","mainEntityOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/"},"wordCount":1098,"commentCount":0,"publisher":{"@id":"https:\/\/enthec.com\/#organization"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg","keywords":["Cybersecurity","Prevention"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/","url":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/","name":"\u25b7 Cybersecurity and the human factor [WARNING] | Enthec","isPartOf":{"@id":"https:\/\/enthec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage"},"image":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg","datePublished":"2025-12-01T06:33:00+00:00","description":"Cybersecurity and the human factor: human error remains the most significant digital threat \u261d Learn how to reduce risks with better habits","breadcrumb":{"@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#primaryimage","url":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2025\/11\/factor-humano-ciberseguridad.jpg","width":7952,"height":5304,"caption":"El factor Humano en Ciberseguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/enthec.com\/en\/cybersecurity-and-the-human-factor-the-most-common-mistake-in-digital-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/enthec.com\/en\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity and the human factor: the most common mistake in digital protection"}]},{"@type":"WebSite","@id":"https:\/\/enthec.com\/#website","url":"https:\/\/enthec.com\/","name":"ENTHEC","description":"Advanced AI-driven Cyber-Surveillance Platform","publisher":{"@id":"https:\/\/enthec.com\/#organization"},"alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/enthec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/enthec.com\/#organization","name":"ENTHEC","alternateName":"ENTHEC \u00b7 Kartos \u00b7 Qondar","url":"https:\/\/enthec.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/","url":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","contentUrl":"https:\/\/enthec.com\/wp-content\/uploads\/2024\/08\/Fondo-blanco_1.png","width":667,"height":131,"caption":"ENTHEC"},"image":{"@id":"https:\/\/enthec.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/enthec.com\/#\/schema\/person\/3ee5632ff6252f2a608293472d04f1a1","name":"Enthec","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93ca4c2a26bdadca49595a5b6c3ff31e89454d39aea2d10350e023c219d1adef?s=96&d=mm&r=g","caption":"Enthec"},"url":"https:\/\/enthec.com\/en\/author\/enthec\/"}]}},"_links":{"self":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/comments?post=4329"}],"version-history":[{"count":1,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4329\/revisions"}],"predecessor-version":[{"id":4337,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/posts\/4329\/revisions\/4337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media\/4320"}],"wp:attachment":[{"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/media?parent=4329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/categories?post=4329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enthec.com\/en\/wp-json\/wp\/v2\/tags?post=4329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}