The human factor, the first line of defense in cybersecurity

The human factor as the first line of defense in cybersecurity

It may seem that a cyberattack begins with a sophisticated hack, but the reality is that one of the most commonly used vectors remains the same: the human factor, through oversights, haste, or incorrect validations.

A very clear example of this was the case of MGM Resorts in 2023. In this incident, the attackers did not need to exploit a complex vulnerability to gain entry: they obtained access through social engineering, impersonating an employee and contacting the support service to recover credentials.

Below is a simplified timeline of the incident:

Timeline of the cyberattack on MGM Resorts in 2023 through social engineering

Timeline of the cyberattack on MGM Resorts (2023).

From that initial access, the attack escalated rapidly and ultimately generated a direct impact on the company’s operations, demonstrating something that is repeated time and again in cybersecurity: when an attacker manages to get someone to “open the door,” the rest is usually only a matter of time.

These types of attacks are especially dangerous because they are not based on “breaking” a system, but on taking advantage of common situations in any organization: urgent requests, pressure to resolve incidents quickly, or requests that appear legitimate.

Within minutes, a compromised account can become a gateway to internal tools, emails, sensitive documentation, or even to impersonating employees in order to attack other colleagues.

The key is to understand that, in many cases, the risk does not begin with technology but with the process: how identities are validated, how access recoveries are handled, and how we respond to unexpected requests. That is why social engineering remains so effective: it plays on urgency, trust, and context, leading the organization to lower its guard precisely when it should not.

What warning signs should make you stop?

Recommendations to reduce risk

For employees

  • Never share verification codes (MFA/OTP), even if the request appears legitimate.
  • If someone requests urgent access, verify through a second channel (registered corporate contact).
  • If something does not add up, stop and consult: two minutes can prevent a serious incident.
  • Report any suspicious attempt: many campaigns are repeated with multiple employees.

For support / IT teams

  • Maintain a strict process for account recovery and password resets.
  • Avoid urgency-based exceptions: they are precisely what the attacker is looking for.
  • Enable alerts for unusual access and anomalous activity.

Not all incidents begin with a technical failure. Sometimes they begin with a phone call. That is why strengthening verification processes and habits is one of the most effective measures to protect a company.

⚠️ REMEMBER: Within minutes, a compromised account can become a gateway.