Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
5 Questions with… CybSafe CEO Oz Alashe
CBR Online
CybSafe offers free cybersecurity awareness modules
Channel Info
Cyber security behaviour of smartphone users through the lens of Fogg Behaviour Model
Many theories from behavioural science like the theory of planned behaviour and protection motivation theory have been used to investigate the factors that affect the cybersecurity behaviour and practices of the end-user. In this paper, the researchers have used Fogg...
Human behaviour in cyber security
The aim of this research is to identify the history of cyber threats and define the cyber security system. Moreover, highlight the human behavior and factor that influencing the security system supported by a qualitative research that are done by interviewing...
HP announces new lockdown-friendly security solutions
IT Pro
Six security essentials for those working from home
The COVID-19 outbreak is promoting remote working. Here’s how to minimise cyber risk when working from home 1. Use company-approved devices Mental blueprints dictate how we behave in any given situation. Our blueprints might prompt us to use personal laptops...
Cyber criminals are using COVID-19 cover stories in new phishing attacks
Here’s how to spot and stop the attacks Criminals are using COVID-19 stories to convince people to do things they’d never normally do. In one deplorable scam, cyber criminals email elderly targets. The criminals claim they represent medical organisations. They ask for...
Expert discussion: What best practice approach should businesses take to password security?
Intelligent CIO
An examination of the effect of recent phishing encounters on phishing susceptibility
This paper examines online users' perceived susceptibility to phishing attacks. We posit that an individual's phishing susceptibility may be shaped by recent phishing encounters and, more importantly, that the effect of new experience on susceptibility will be...
60% of Company Security Breaches Caused by Human Error
Digit.fyi
Stop saying employees are the weakest link in cybersecurity
TNW
Coronavirus, Trump threats, geopolitical campaigns – how they affect your business & what you should do
SC Magazine
#Privacy: Boots suffers cyber attack
GDPR Report
Tesco Issues New Clubcards After Customer Account Security Concerns
Digit.fyi
Network Rail admits online exposure of Wi-Fi user data
Railway Technology
On demand webinar: Punishment in cybersecurity
webinarPunishment in Cyber SecurityIn this virtual workshop, we will be discussing the implications of punishment for managing cyber security behaviour and the findings from our Simulated Phishing and Employee Cyber security behaviour (SPEC) project. Naming and...
Cyber risk – are your employees your weakest link?
Lexology
CybSafe Named as a Leader in Security Awareness And Training Solutions by Independent Research Firm
PR Newswire (Paid)
Data Protection Principals For Leaders in Education, Data Security Matters.
FE News
Developing a measure of information seeking about phishing
Phishing e-mails are fraudulent e-mails used to gain access to sensitive information or secure computer systems. They persuade users to click on malicious links, download attachments, or provide sensitive information, such as usernames or passwords. One approach that...
How cyber criminals really thrive
Capx