Defending the weakest link from cyberattacks