Select Page
Personalising cybersecurity in the workplace

Personalising cybersecurity in the workplace

Most cyber security solutions take a one-size-fits-all approach. Everyone gets the same training and the same simulated phishing emails.  Yet, we all respond to cyber threats in different ways. Our personalities and differences often play a key role in how we act. For...
Burnout in the tech industry

Burnout in the tech industry

We need to talk about burnout. Sadly, it’s something most of us will be all too familiar with, particularly in the tech industry. A post-pandemic study revealed 62% of cyber security professionals found their role stressful. This year, the lines between work and home...
How does personality influence your cyber risk?

How does personality influence your cyber risk?

People are central to cyber security. Empowered with the right skills and tools, people can protect themselves and their organisations from cyber attack. But people aren’t all the same. Each of us has our own personality. And studies show links between our...
How to build good cyber security habits

How to build good cyber security habits

We are all creatures of habit. Some habits we’d rather get rid of. But others can be beneficial. When it comes to cyber security, building good habits is essential. By building better security behaviour into our lives, we reduce our cyber risk. So how do we go about...
The 4 key factors for a successful phishing simulation

The 4 key factors for a successful phishing simulation

Phishing attacks are a problem. Over the past year, 88% of professionals  reported an increase in phishing attacks. It can happen to anyone, at any time.  For many, the go-to solution to this problem is a simulated phishing attack. But for this to be a success, it has...