Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods
This paper proposes a conceptual model which provides an integrative and structural perspective to describe how social engineering attacks work. Three core entities (effect mechanism, human vulnerability and attack method) are identified to help the understanding of...
Understanding security behavior of real users: analysis of a phishing study
This paper presents a set of statistical analyses on an empirical study of phishing email sorting by real online users. Participants were assigned to multitasking and/or incentive conditions in unattended web-based tasks that are the most realistic in any comparable...
Cyber Security Breaches Survey 2021
The Cyber Security Breaches Survey is a quantitative and qualitative study of UK businesses, charities and education institutions. It helps these organisations to understand the nature and significance of the cyber security threats they face, and what others are doing...
Golden age for cyber awarness
Professional Security
20 book recommendations from tech and business leaders
TechRegister
Essential Cybersecurity Practices For Internet Businesses
Forbes
Measuring psychosocial and behavioural factors improves attack potential estimates
Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers' types, profiles, and competencies. In this paper, we present a holistic, multidimensional approach to examine...
Taking risks with cyber security: Using knowledge and personal characteristics to predict self-reported cyber security behaviours
While training individuals on best practices in cybersecurity continues to be implemented, prior research has found that training people in the use of secure passwords has not proven to be effective. Developing profiles of individual who are likely to become victims...
[Financial services] Hastings Group
Hastings Group chose CybSafe for its innovative, human-centric approach to cyber security. Unlike other solutions that focused solely on phishing or compliance, CybSafe offered a comprehensive platform designed to engage users and build a true culture of resilience....
Retailers face tough sell over data collection technology
FT
A cyber security culture framework for assessing organisation readiness
This paper presents a cyber-security culture framework for assessing and evaluating the current security readiness of an organization’s workforce. Having conducted a thorough review of the most commonly used security frameworks, it identifies core security...
Common employee mistakes resulting in data breaches
Marsh Commerical (Jelf Group) Blog
If you want to change security behavior, stop thinking like a security professional, start thinking like an entrepreneur.
In 1998, Evan Goldberg revolutionised an industry. This is what we can learn from his story. It was 1998. Evan Goldberg was the owner of a one failed start-up and another that was yet to make a single sale. Still, as he worked on his new venture – from an...
On demand webinar: Meaningful metrics in action
webinarMeaningful metrics in actionJoin us for a lively and interesting discussion between 3 CISOS sharing their thoughts, challenges and daily views on what meaningful metrics mean to them day in, day out. CybSafe’s guest speakers include: Dr Alison Vincent, Former...
Honesty is the best policy: Forging a security culture in the NHS
Computer Weekly
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing
Previous studies have observed an intention-behavior gap that has been labeled the “privacy paradox”: people disclose personal information (behavior) despite expressing negative sharing intentions (in surveys). However, this phenomenon has not been studied in the...
[Financial Services] Credit Suisse
Struggling to get people engaged with security awareness activity? Credit Suisse use CybSafe to do just that - covering 86,000 colleagues in 150 offices. Learn how.
Awareness is everything in cybersecurity — until it wears off
Tech HQ
Huge Increase in Data Loss Incidents at The Home Office
Digit
Refining the blunt instruments of cyber security: A framework to coordinate prevention and preservation of behaviours
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be protected, and...
LORCA Live: cyber stories
Professional Security Magazine