Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
[Healthcare & Pharmaceutical] NHS Bolton
Time is a premium for healthcare workers, now more than ever. So security awareness often takes a back seat. Discover how NHS Bolton use CybSafe to make the most of that narrow window of opportunity.
Entrepreneur Insight – Oz Alashe founder and CEO of CybSafe
New Business Magazine Online
Revolution and stability in the study of the human factor in the security of information systems field : A systematic literature review over 30 years of publication
Human factor is widely recognized as the first threat to the security of information systems (ISS). ISS research thus points to the problem of user behavior, which is overwhelmingly represented as a fallibility that would be part of its nature. Companies would...
Is your digital footprint making you prone to attacks?
Every time you access the internet you leave a data trail that contributes to your “digital footprint”. Each of us has a digital footprint. It’s the accumulation of our online data produced over time. Together, this data creates a rich picture of our habits and...
Leveraging human factors in cyber security: an integrated methodological approach
Computer and Information Security (CIS) is usually approached adopting a technology-centric viewpoint, where the human components of sociotechnical systems are generally considered as their weakest part, with little consideration for the end users’ cognitive...
We need to talk about burnout in the tech industry
Business Leader
Mindfulness and cybersecurity behavior: A comparative analysis of rational and intuitive cybersecurity decisions
Despite substantial investments in technological solutions to bolster cybersecurity, human factors, such as employees falling for phishing attacks, remain a significant vulnerability that can undermine even the most advanced security systems. Drawing upon dual-process...
Japanese Government Agencies Suffered Cyber Attack
CPO Magazine
Why disciplining human error doesn’t work when it comes to cyber security
Nobody likes being punished. So why are we so quick to punish those who fall victim to cyber-attacks? A recent study by CybSafe found 4 in 10 organisations choose to discipline staff who make cyber security errors. There’s no doubt we need to respond when such...
Fujitsu pulls ProjectWEB tool offline after apparent supply chain attack sees Japanese infosec agency data stolen
The Register
Ransomware attack on the Irish Health Service Executive
Last week, the Irish Health Service Executive (HSE) suffered a cyber attack which forced a temporary shutdown of its IT systems. This caused huge disruption across the service. Following the attack, patients’ personal and medical information was shared online and a...
5 best practices for conducting ethical and effective phishing tests
CSO
Schroder UK Public Private Tst plc Investment in Tessian
ADVFN UK
Schroder UK PublicPT : Investment in Tessian
Investegate
Mazephishing: the COVID-19 pandemic as credible social context for social engineering attacks
Although the pandemic is certainly not the first occurrence of socially disruptive circumstances that drive cyber criminals to action, relevant academic scholarship has remained scarce. To fill this gap in literature, and propose the analytical framework of...
Personalising cybersecurity in the workplace
Most cyber security solutions take a one-size-fits-all approach. Everyone gets the same training and the same simulated phishing emails. Yet, we all respond to cyber threats in different ways. Our personalities and differences often play a key role in how we act. For...
What’s going on with the HSE cyber-attack?
Silicon Republic
Irish health service latest victim of cyber crime
Building Better Healthcare
UK smart city cyber plan: `A brilliant start”, say experts
Verdict
Ransomware: Economic impact analysis
The questions this project addressed include: How is social engineering used to deploy malware? What is the economic impact of successful malware/ransomware attacks? What security measures can be implemented to help mitigate these attacks? This research focuses on...
Adversarial ‘intended’ use of technology and the need for new threat models addressing human harms
The need for new threat models is considered first through a study of user behavior and perceptions of norms with respect to phone sharing and access behaviors in romantic relationships. We find that most people give their partner access to their phone but often have...