How User Training Can Be Used to Strengthen the “Weakest Link” in the Chain of Protection Against Cybercrime †
Abstract
1. Introduction
2. Development
- Misinformed people.
- Fragmented or incorrect information, largely encouraged by the proliferation of so-called “Fake News”.
- Smear campaigns and threats to spread them.
- Access to systems and resources of institutions with few security measures.
- User dissatisfaction with strong passwords and two-factor authentication.
- Poor ability to detect the authenticity or falsity of messages or requests for action [5].
2.1. The Role of the “Insider”
2.2. About the Training
2.3. The Trainer
3. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Domínguez, C. Es la ciberseguridad centro de preocupación: Tendencias. DATA, NUBE Y CIBERSEGURIDAD. Reforma, Negocios, 26 Agosto 2022. Available online: https://www.reforma.com/aplicacioneslibre/preacceso/articulo/default.aspx?__rval=1&urlredirect=https://busquedas.gruporeforma.com/buscar/reforma/documentos/VisorArticulos.aspx?idComptto=6&sIdIdentificadorParm=6s7976185d&idproducto=3&id=2327041&tipoElemento=/impresa/&text=Es%20la%20ciberseguridad%20el%20centro%20de%20preocupaci%f3n%20&imgUrl=https://hemerotecalibre.reforma.com/20220826/interactiva/RSNG20220826-006.JPG (accessed on 26 January 2026).
- Dirección General de Coordinación y Estudios, Secretaría de Estado de Seguridad. Informe Sobre la Cibercriminalidad en España; Ministerio del Interior, Gobierno de España: Madrid, Spain, 2023.
- Ciprian Birlea, M. Phishing Attacks: Detection And Prevention. arXiv 2020, arXiv:2004.01556. [Google Scholar] [CrossRef]
- González, J.A.L.; Granados, A.R. Delitos Informáticos: Su Clasificación y una Visión General de las Medidas de Acción Para Combatirlo; Universidad Autónoma de Nuevo León: San Nicolás de los Garza, Mexico, 2013; pp. 44–51. [Google Scholar]
- Acosta, M.G.; Benavides, M.M.; García, N.P. Delitos Informáticos: Impunidad Organizacional y su complejidad en el mundo de los negocios. Rev. Venez. Gerenc. 2020, 8, 351–368. [Google Scholar]
- Hernández, R.V.R.; Ibarra, C.M.J. Concientización y capacitación para incrementar la seguridad informática en estudiantes universitarios. Rev. Tecnol. Soc. 2018, Año 8, 14. [Google Scholar]
- Blackwell, C. Insider Threat: Combating the Enemy Within; IT Governance Publishing: Cambs, UK, 2019. [Google Scholar]
- Mazzarolo, G.; Jurcut, A.D. Insider threats in cyber security: The enemy within the gates. arXiv 2019, arXiv:1911.09575. [Google Scholar] [CrossRef]
- Harjinder, L.; Jane, S.; Mike, J.; Helge, J.; Blaine, P.; Richard, H. Pedagogic Challenges in Teaching CyberSecurity—A UK Perspective. In Proceedings of the 2014 IEEE International Conference on Communications and Computing, Sydney, Australia, 10–14 June 2014. [Google Scholar]

| Age Group | Male | Female | Unknwon |
|---|---|---|---|
| Unknown Age | 159 | 160 | 20 |
| Minors | 2238 | 2651 | 7 |
| From 18 to 35 | 22,286 | 22,841 | 3 |
| From 26 to 40 | 43,843 | 48,973 | 14 |
| From 41 to 50 | 38,428 | 43,382 | 30 |
| From 51 to 65 | 44,921 | 45,049 | 40 |
| Over 65 | 22,895 | 16,650 | 20 |
| TOTAL | 174,770 | 179,706 | 134 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Portas Yáñez, J.A.; Sandoval Orozco, A.L.; García Villalba, L.J. How User Training Can Be Used to Strengthen the “Weakest Link” in the Chain of Protection Against Cybercrime. Eng. Proc. 2026, 123, 38. https://doi.org/10.3390/engproc2026123038
Portas Yáñez JA, Sandoval Orozco AL, García Villalba LJ. How User Training Can Be Used to Strengthen the “Weakest Link” in the Chain of Protection Against Cybercrime. Engineering Proceedings. 2026; 123(1):38. https://doi.org/10.3390/engproc2026123038
Chicago/Turabian StylePortas Yáñez, José Agustín, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. 2026. "How User Training Can Be Used to Strengthen the “Weakest Link” in the Chain of Protection Against Cybercrime" Engineering Proceedings 123, no. 1: 38. https://doi.org/10.3390/engproc2026123038
APA StylePortas Yáñez, J. A., Sandoval Orozco, A. L., & García Villalba, L. J. (2026). How User Training Can Be Used to Strengthen the “Weakest Link” in the Chain of Protection Against Cybercrime. Engineering Proceedings, 123(1), 38. https://doi.org/10.3390/engproc2026123038

