Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Digital human in cyber security risk assessment
The work aims to build a formal ontology-based model for cyber security risk assessment that considers digital human characteristics. A multi-layered architecture solution was build as a proof of concept to maintain a set of artificial intelligence algorithms and...
Understanding the last line of defense: Human response to cyber security events
Cybersecurity is an escalating concern in today's technology-driven world, spanning consumer, corporate, and military domains. A literature review focused on human responses to cybersecurity incidents reveals a three-phase process in cybersecurity response: 1....
A mixed methods approach to understanding cyber-security vulnerability in the baby boomer population
The ongoing development and ubiquitous spread of technology has brought with it new threats and opportunities for online victimisation. Although human factors cyber-security research continues to try to mitigate these threats through the application of behavioural...
The current state of research on people, culture and cyber security
What is becoming apparent is that we need a better understanding of the human aspects of cyber security not only in terms of its impacts on organisations, communities and individuals but also in terms of how human behaviour itself contributes to cyber security-related...
Salvation Army Hit by Ransomware Attack
InfoSecurity Magazine
Human factors in cyber security: A scoping review
In this work we carry out a scoping review to investigate the take of the computer science community on the human-centric cyber security paradigm by considering the top conferences on network and computer security for the past six years. Results show that broadly two...
How safely do we behave online? An explanatory study into the cybersecurity behaviors of Dutch citizens
The Capability-Opportunity-Motivation-Behavior (COM-B) model posits that individuals' behavior can be understood by considering their capabilities, opportunities, motivation, and the interplay among these factors. This research aims to apply the COM-B model to analyze...
Angelsey schools offline after cyber attack
Computer Weekly
The Internet of Things and cyber security: what are the risks?
In today's society, we are more interconnected than ever before. The devices we use are linked in unprecedented ways. A big factor behind this is the rise of the Internet of Things (IoT). It brings internet connectivity to a range of devices. From watches and phones...
[Healthcare & Pharmaceutical] NHS Bolton
Time is a premium for healthcare workers, now more than ever. So security awareness often takes a back seat. Discover how NHS Bolton use CybSafe to make the most of that narrow window of opportunity.
Entrepreneur Insight – Oz Alashe founder and CEO of CybSafe
New Business Magazine Online
Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication
Human factor is widely recognized as the first threat to the security of information systems (ISS). ISS research thus points to the problem of user behavior, which is overwhelmingly represented as a fallibility that would be part of its nature. Companies would...
Is your digital footprint making you prone to attacks?
Every time you access the internet you leave a data trail that contributes to your “digital footprint”. Each of us has a digital footprint. It’s the accumulation of our online data produced over time. Together, this data creates a rich picture of our habits and...
Leveraging human factors in cyber security: an integrated methodological approach
Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive...
We need to talk about burnout in the tech industry
Business Leader
Mindfulness and cybersecurity behavior: A comparative analysis of rational and intuitive cybersecurity decisions
Despite substantial investments in technological solutions to bolster cybersecurity, human factors, such as employees falling for phishing attacks, remain a significant vulnerability that can undermine even the most advanced security systems. Drawing upon dual-process...
Japanese Government Agencies Suffered Cyber Attack
CPO Magazine
Why disciplining human error doesn’t work when it comes to cyber security
Nobody likes being punished. So why are we so quick to punish those who fall victim to cyber-attacks? A recent study by CybSafe found 4 in 10 organisations choose to discipline staff who make cyber security errors. There’s no doubt we need to respond when such...
Fujitsu pulls ProjectWEB tool offline after apparent supply chain attack sees Japanese infosec agency data stolen
The Register
Ransomware attack on the Irish Health Service Executive
Last week, the Irish Health Service Executive (HSE) suffered a cyber attack which forced a temporary shutdown of its IT systems. This caused huge disruption across the service. Following the attack, patients’ personal and medical information was shared online and a...
5 best practices for conducting ethical and effective phishing tests
CSO