Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Why some people may take more security risks when working remotely
And a free resource to ensure they don’t... It’s 9:30am on a Wednesday and CybSafe’s Sam Oliver looks a little odd. He’s just joined a regular CybSafe meeting. It’s a meeting to which Sam usually wears business dress. But today Sam is dressed casually. And he isn’t...
Gotcha! Behavioural validation of the Gullibility Scale
Every year online scams cause substantial emotional and financial adversity. A recently developed self-report measure of gullibility has the potential to provide insight into how individual differences in gullibility are related to susceptibility to scams. The current...
Working from home? How to stay in touch and stay secure
The Guardian
Paid software and services available for free during the pandemic from Microsoft, Facebook and more
TechRadar Pro
What coronavirus small business help is available for free?
Small Business
‘Major data breaches are far too common, with human error often being a cause’
Silicon Republic
Happy developers in mature teams make secure software: Study
SC Magazine
5 Questions with… CybSafe CEO Oz Alashe
CBR Online
CybSafe offers free cybersecurity awareness modules
Channel Info
Cyber security behaviour of smartphone users through the lens of Fogg Behaviour Model
Many theories from behavioural science like the theory of planned behaviour and protection motivation theory have been used to investigate the factors that affect the cybersecurity behaviour and practices of the end-user. In this paper, the researchers have used Fogg...
Human behaviour in cyber security
The aim of this research is to identify the history of cyber threats and define the cyber security system. Moreover, highlight the human behavior and factor that influencing the security system supported by a qualitative research that are done by interviewing...
HP announces new lockdown-friendly security solutions
IT Pro
Six security essentials for those working from home
The COVID-19 outbreak is promoting remote working. Here’s how to minimise cyber risk when working from home 1. Use company-approved devices Mental blueprints dictate how we behave in any given situation. Our blueprints might prompt us to use personal laptops...
Cyber criminals are using COVID-19 cover stories in new phishing attacks
Here’s how to spot and stop the attacks Criminals are using COVID-19 stories to convince people to do things they’d never normally do. In one deplorable scam, cyber criminals email elderly targets. The criminals claim they represent medical organisations. They ask for...
Expert discussion: What best practice approach should businesses take to password security?
Intelligent CIO
An examination of the effect of recent phishing encounters on phishing susceptibility
This paper examines online users' perceived susceptibility to phishing attacks. We posit that an individual's phishing susceptibility may be shaped by recent phishing encounters and, more importantly, that the effect of new experience on susceptibility will be...
60% of Company Security Breaches Caused by Human Error
Digit.fyi
Stop saying employees are the weakest link in cybersecurity
TNW
Coronavirus, Trump threats, geopolitical campaigns – how they affect your business & what you should do
SC Magazine
#Privacy: Boots suffers cyber attack
GDPR Report
Tesco Issues New Clubcards After Customer Account Security Concerns
Digit.fyi