Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
If someone is watching, I’ll do what I’m asked: Mandatoriness, control, and information security
This research finds people are motivated to follow security procedures when they believe the procedures to be compulsory, and that both specifying policies and evaluating behaviors help position security policies as mandatory. It follows that specifying policies and...
Nudges for privacy and security: Understanding and assisting users’ choices online
Advancements in information technology often task users with complex and consequential privacy and security decisions. A growing body of research has investigated individuals’ choices in the presence of privacy and information security tradeoffs, the decision-making...
Tackling the human aspect of cybersecurity: The psychology of a law firm
Tackling the Human Aspect of Cyber Security: Legal PsychologyFor years, cyber attackers have relied on human psychology to manipulate victims and launch their most common, most disruptive attacks. Developed in collaboration with behavioural change psychologist...
Deloitte hit by major client email hack
AccountingWeb
Deloitte cyber-attack: Is your firm safe?
AccountancyAge
Rate of data compromise revealed: 121 records per sec; defenders lagging
SC Magazine
The supply chain conundrum: Why large businesses fear data breaches from SME suppliers
ITProPortal
Gains, losses and unconscious calculations
Our attitudes to loss make us vulnerable online. Here’s how we can nullify the risks – starting with a question. Which of these two generous offers would you rather take up? The first is £1000 in cash with no strings attached. The second is the chance to win £2000 –...
Large enterprises beginning to question SME cyber security, Inaugural CybSafe Supplier Cyber Security Study finds
1 in 3 SMEs say they needed cyber security precautions to win new contracts in the last year alone Large enterprises are beginning to scrutinise the cyber security of their suppliers. As part of our Inaugural CybSafe Supplier Cyber Security Study, we looked into the...
How CybSafe turns a perceived cyber security risk into another line of defence
Your people are often cited as one of the greatest cyber security risks your company faces. By changing their behaviour, CybSafe turns them into a resilient line of defence For cyber criminals, it must seem so easy. Step 1: Gather personal informationStep 2: Send a...
10 ways to make cyber security part of your working culture
How can cyber security professionals use psychology to help people prioritise cyber security in the workplace? 1. Increase face-to-face interaction Unsurprisingly, the vast majority of messages from IT security departments are written and sent digitally. Emails and...
The Human Element: Cyber Security’s Forgotten Conversation
Cyber Defense Magazine
Substandard cyber security training could be helping cyber criminals
To truly increase cyber resilience, cyber security training is going to need to focus on changing human behaviour Earlier this year, the UK government released its latest report on cyber security breaches amongst UK businesses. The findings were somewhat...
Radio Interview
BBC Jersey
The UK has ‘a long way to go’ to be cyber secure – MP
CRN
68% of boards not trained to deal with cyber-security incidents
SC Magazine
Measuring the effectiveness of embedded phishing exercises
Embedded phishing exercises, which send test phishing emails, are utilized by organizations to reduce the susceptibility of its employees to this type of attack. Research studies seeking to evaluate the effectiveness of these exercises have generally been limited by...
8 reasons why I’m more positive than most when it comes to cyber security
Following a series high-profile cyber attacks, most cyber security professionals predict the future will be bleak. Our CEO, Oz Alashe, meanwhile, has other ideas “Is this the end of the world as we know it?” asked IT security specialist Susan Morrow in her blog post...
Tech Leaders Awards 2017 – finalists revealed
Information Age
Cybersecurity regained: Preparing to face cyber attacks
Packed with statistics and survey results, this paper profiles the ever-growing cyber threat landscape and offers advice to help address and overcome risks.
CybSafe to place cybersecurity training at the heart of Law Society’s services for its members
Legal Technology