Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Could better cyber defences actually increase your risk of cyber attack?
The psychologist Gerald Wilde certainly thinks so – and he’s armed with credible examples that back up his claims Here’s one such example of what psychologist Gerald Wilde calls risk homeostasis. On Saturday, 2nd September, 1967, the population of Sweden went to sleep...
Comment about how cyber threats are damaging the global economy and marketplace (article was backdated)
Finance Monthly
Individual differences in susceptibility to online influence: A theoretical review
This paper reviews academic literature on the both individual differences and contextual factors that influence susceptibility to cyber attacks, including self-awareness, self-control, security expertise, motivation, trust and attitudes to risk.
People are not the problem. They are part of the solution.
A follow-up to a previous post on harnessing the power of people in our fight against cybercrime Our previous article highlighted some interesting statistics According to a Mozilla, 91% of people still “don't know much about protecting themselves online.” According to...
Becoming a cyber-security ‘trusted vendor’ will determine SME success
SC Magazine
Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours
The present study explored the relationship between risky cybersecurity behaviours, attitudes towards cybersecurity in a business environment, Internet addiction, and impulsivity. 538 participants in part-time or full-time employment in the UK completed an online...
Cyber security threats to IoT applications and service domains
We are currently living in the post-PC era where smartphones and other wireless handheld devices are changing our environment, making it more interactive, adaptive and informative. Termed as Internet of Things (IoT) evolving into Internet of Everything, the new...
Why cybercrime success continues to soar
Cybercrime and cybercrime success are both on the up. To stand any chance of meaningfully reducing cybercrime, we need to call on an underused resource Today’s cyber criminals have it easy At least, that’s what newspaper headlines seem to suggest. “Companies struggle...
Written Q&A
Startups.co.uk
Meet London’s new cyber security hack-busting squad
Evening Standard
MPs’ emails shut down after widespread cyber attack
A to B Magazine
Parliament hit by cyber attack as hackers attempt to access MPs’ email accounts
Independent
Parliament hit by ‘sustained and determined’ cyber attack leaving MPs unable to access their emails remotely (quote was subsequently removed for Sunday’s paper – link to original version)
Daily Telegraph
El Parlamento británico sufre un intento de ataque informático
Europapress
Парламент Великобритании подвергся мощной кибератаке
Newsru
El parlament britànic sofreix un intent d’atac informàtic
Vilaweb
A new weapon for businesses seeking to combat cyber crime
How businesses can make use of a cyber defence governments have relied on for years Are you aware of what happened on the 7th September last year? At Vienna airport, a group of Turkish nationals began protesting. Their flight had been grounded and, without visas...
Email prankster catches Morgan Stanley CEO with a fishy tale
Financial News
How supplying cybersecurity training can turn workers into your greatest defence
Elite Franchise Magazine
The Optimism Bias In Cyber Security
The optimism bias is an age-old human trait essential to our well being. The optimism bias in cyber security, however, causes security problems... In 2015, financial services giant Prudential ran an experiment they called ‘magnets’. The company labelled a series of...
Implementing effective cyber security training for end users of computer networks
Cyber security is a concern for all modern organizations. These organizations cannot achieve their cyber security goals through hardware and information technology (IT) workers alone, so all employees who use computer networks must be trained on the knowledge, skills...