Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Human behaviour in cyber security
The aim of this research is to identify the history of cyber threats and define the cyber security system. Moreover, highlight the human behavior and factor that influencing the security system supported by a qualitative research that are done by interviewing...
HP announces new lockdown-friendly security solutions
IT Pro
Six security essentials for those working from home
The COVID-19 outbreak is promoting remote working. Here’s how to minimise cyber risk when working from home 1. Use company-approved devices Mental blueprints dictate how we behave in any given situation. Our blueprints might prompt us to use personal laptops...
Cyber criminals are using COVID-19 cover stories in new phishing attacks
Here’s how to spot and stop the attacks Criminals are using COVID-19 stories to convince people to do things they’d never normally do. In one deplorable scam, cyber criminals email elderly targets. The criminals claim they represent medical organisations. They ask for...
Expert discussion: What best practice approach should businesses take to password security?
Intelligent CIO
An examination of the effect of recent phishing encounters on phishing susceptibility
This paper examines online users' perceived susceptibility to phishing attacks. We posit that an individual's phishing susceptibility may be shaped by recent phishing encounters and, more importantly, that the effect of new experience on susceptibility will be...
60% of Company Security Breaches Caused by Human Error
Digit.fyi
Stop saying employees are the weakest link in cybersecurity
TNW
Coronavirus, Trump threats, geopolitical campaigns – how they affect your business & what you should do
SC Magazine
#Privacy: Boots suffers cyber attack
GDPR Report
Tesco Issues New Clubcards After Customer Account Security Concerns
Digit.fyi
Network Rail admits online exposure of Wi-Fi user data
Railway Technology
On demand webinar: Punishment in cybersecurity
webinarPunishment in Cyber SecurityIn this virtual workshop, we will be discussing the implications of punishment for managing cyber security behaviour and the findings from our Simulated Phishing and Employee Cyber security behaviour (SPEC) project. Naming and...
Cyber risk – are your employees your weakest link?
Lexology
CybSafe Named as a Leader in Security Awareness And Training Solutions by Independent Research Firm
PR Newswire (Paid)
Data Protection Principals For Leaders in Education, Data Security Matters.
FE News
Developing a measure of information seeking about phishing
Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments, or provide sensitive information, such as usernames or passwords. One approach that...
How cyber criminals really thrive
Capx
Meaningful Metrics for Human Cyber Risk
Meaningful Cybersecurity Metrics for Human Cyber RiskMost organizations fail to measure their human cyber risk. Meaningful cyber security metrics are key to measuring the effectiveness of cyber security programs. Organizations and security leaders are well aware of...
Insider data breaches continue to worry IT leaders
SC Magazine
How to ensure your organisation is safe from the cyber threat
Information Age