Burnout in the tech industry

Burnout in the tech industry

We need to talk about burnout. Sadly, it’s something most of us will be all too familiar with, particularly in the tech industry. A post-pandemic study revealed 62% of cyber security professionals found their role stressful. This year, the lines between work and home...
How does personality influence your cyber risk?

How does personality influence your cyber risk?

People are central to cyber security. Empowered with the right skills and tools, people can protect themselves and their organisations from cyber attack. But people aren’t all the same. Each of us has our own personality. And studies show links between our...
How to build good cyber security habits

How to build good cyber security habits

We are all creatures of habit. Some habits we’d rather get rid of. But others can be beneficial. When it comes to cyber security, building good habits is essential. By building better security behaviour into our lives, we reduce our cyber risk. So how do we go about...
Three approaches to help you stay secure with remote working

Three approaches to help you stay secure with remote working

The way we work is changing. Our approach to cyber security needs to change too.   Remote working is here to stay. Even when we reach the day where workplaces open their doors again, things won’t be as they were. CybSafe will be joining a growing list of...
The 4 key factors for a successful phishing simulation

The 4 key factors for a successful phishing simulation

Phishing attacks are a problem. Over the past year, 88% of professionals  reported an increase in phishing attacks. It can happen to anyone, at any time.  For many, the go-to solution to this problem is a simulated phishing attack. But for this to be a success, it has...
Why Phishing Training Is Important

Why Phishing Training Is Important

Phishing attacks are the most common cyber threat to UK businesses. This form of cyberattack can be remarkably unsophisticated. Yet, the disruption caused can be huge.  So why are phishing attacks such a problem? What can be done to limit their success?  ...