Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Measuring psychosocial and behavioural factors improves attack potential estimates
Cyber risk assessment standards and methodologies do not consider psychological, social and behavioural parameters in their classifications of the attackers' types, profiles, and competencies. In this paper, we present a holistic, multidimensional approach to examine...
Taking risks with cyber security: Using knowledge and personal characteristics to predict self-reported cyber security behaviours
While training individuals on best practices in cybersecurity continues to be implemented, prior research has found that training people in the use of secure passwords has not proven to be effective. Developing profiles of individual who are likely to become victims...
[Financial services] Hastings Group
Hastings Group chose CybSafe for its innovative, human-centric approach to cyber security. Unlike other solutions that focused solely on phishing or compliance, CybSafe offered a comprehensive platform designed to engage users and build a true culture of resilience....
Retailers face tough sell over data collection technology
FT
A cyber security culture framework for assessing organisation readiness
This paper presents a cyber-security culture framework for assessing and evaluating the current security readiness of an organization’s workforce. Having conducted a thorough review of the most commonly used security frameworks, it identifies core security...
Common employee mistakes resulting in data breaches
Marsh Commerical (Jelf Group) Blog
If you want to change security behavior, stop thinking like a security professional, start thinking like an entrepreneur.
In 1998, Evan Goldberg revolutionised an industry. This is what we can learn from his story. It was 1998. Evan Goldberg was the owner of a one failed start-up and another that was yet to make a single sale. Still, as he worked on his new venture – from an...
On demand webinar: Meaningful metrics in action
webinarMeaningful metrics in actionJoin us for a lively and interesting discussion between 3 CISOS sharing their thoughts, challenges and daily views on what meaningful metrics mean to them day in, day out. CybSafe’s guest speakers include: Dr Alison Vincent, Former...
Honesty is the best policy: Forging a security culture in the NHS
Computer Weekly
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing
Previous studies have observed an intention-behavior gap that has been labeled the “privacy paradox”: people disclose personal information (behavior) despite expressing negative sharing intentions (in surveys). However, this phenomenon has not been studied in the...
[Financial Services] Credit Suisse
Struggling to get people engaged with security awareness activity? Credit Suisse use CybSafe to do just that - covering 86,000 colleagues in 150 offices. Learn how.
Awareness is everything in cybersecurity — until it wears off
Tech HQ
Huge Increase in Data Loss Incidents at The Home Office
Digit
Refining the blunt instruments of cyber security: A framework to coordinate prevention and preservation of behaviours
Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be protected, and...
LORCA Live: cyber stories
Professional Security Magazine
Top Takeaways from GTR Asia 2020
Global Trade Review
Categorizing human phishing difficulty: a Phish Scale
As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials...
Post-pandemic, CISOs are overlooking cyber security
In the new normal, we need to make the most of every defence we have “OK, hit me with it,” says Chief Technology Officer Xu Parker to his CISO, Jeff Jones. Jeff has had ample time to prepare for the Zoom meeting. He’s ready for the question. He purses his lips....
Passive- and not active-risk tendencies predict cyber security behavior
Vulnerabilities to online cyber-related crime are typically the result of poor decisions on the part of users. To date, research on risk-taking behavior applied to cyber-security situations has concentrated mainly on the risks that stem from active behavioral choices...
When believing in technology leads to poor cyber security: Development of a Trust in Technical Controls Scale
While technical controls can reduce vulnerabilities to cyber threats, no technology provides absolute protection and we hypothesised that people may act less securely if they place unwarranted trust in these automated systems. This paper describes the development of a...
UK workers using unauthorized personal devices to work from home
ITProPortal