Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Phishing dominates UK cyber threat landscape, shows analysis of latest ICO figures
CybSafe analysed three years of cyber breach data from the ICO (2017 - 2019) Reports to the ICO in 2019 were up by 28% on 2018’s figures Phishing dominated the UK cyber threat landscape, accounting for 45% of reports to the ICO...
10 ways to get your people interested in cybersecurity
aGet your people interested in cyber security and you become more resilient. Here’s how to go about it, starting with the potential end of the world. Uranium centrifuges facilitate either nuclear power or nuclear weapons. They’re powerful, valuable and extremely...
Phishing dominates the UK threat landscape
BetaNews
Oz Alashe Appearing on TalkRadio – The Business Breakfast with James Max
The Business Breakfast with James Max. Thursday, January 9, 2020 (05:00 - 06:30) Listen to the full episode here.
What is security worth to consumers? Investigating willingness to pay for secure Internet of Things devices
The Internet of Things (IoT) is considered the next technological revolution. IoT devices include once everyday objects that are now internet connected, such as smart locks and smart fridges, but also new types of devices to include home assistants. However, while...
How to boost your team’s digital skills in 2020
SME Technology Guide
Cyber security behaviour of smartphone users in India: An empirical analysis
Many Indians have less experience in dealing with the Internet-enabled device and hence less experience in handling security threats like malware as compared to users of other countries who have gone through the learning curve of handling such security threats using...
Human detection of attacks against cyber-physical systems
The main contributions from this work include: (1) A systematic study of how humans protect against, detect and respond to cyber attacks; (2) A detailed explanation of the devices that people use and their level of awareness of the sensors and components that these...
Enhancing the organisational culture related to cyber security during the university digital transformation
This article presents best practices of universities’ digitalisation from the cyber security and CRC point of view. ENISA’s CSC development guidance was used as the main tool for developing the general CSC programme for universities. The required changes of CSC and...
Cyber security @ home: The effect of home user perceptions of personal security performance on household IoT security intentions
This study explored potential human factors predictors of home user security intentions through the lens of past performance, perceived self-efficacy, and locus of control. While perceived self-efficacy and locus of control are elements in several organizational and...
Get yourself cybersecure for 2020
The Guardian
Password Breach of Game Developer Zynga Compromises 170 Million Accounts
CPO Magazine
Cybersecurity culture: The seven things businesses should be measuring
ITProPortal
Cyber influence of human behavior: Personal and national security, privacy, and fraud awareness to prevent harm
The Internet and connected technology platforms have enabled an increase of cyber influence activity. These actions target a range of personal to national level security and privacy attributes related to cybercrime, behavior, and identities. These emerging threats...
Love playing Draw Something or Words With Friends? Change your password now
TechRadar Pro
MILLIONS OF BRITS USING WEAK AND ‘EXPOSED’ PASSWORDS FOR ONLINE ACCOUNTS, NEW ANALYSIS SHOWS
Data Protection Magazine
6 ways to keep your business premises secure this Christmas?
Talk Business
#Privacy: Studies show UK consumers vulnerable due to weak passwording
GDPR:Report
Why do some organizations use two lms security awareness training solutions at once?
Why do some organizations often use two or more security awareness training solutions at once? That’s a question that grabbed our attention when it popped up on social recently. The comment highlighted the following cyber security oddity… Increasing numbers of...
The effects of the property of access possibilities and cyber security awareness on social media application
Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe...
Millions of Brits using weak and ‘exposed’ passwords
Fudzilla