People are often called the weakest link in the security chain. What technical or non-technical methods can be used to counteract this threat?. People are often called the weakest link in the security chain. What technical or non-technical methods can be used to counteract this threat?