Rewind
All the content from last year’s PeepSec, Impact and flagship industry events
Human detection of attacks against cyber-physical systems
The main contributions from this work include: (1) A systematic study of how humans protect against, detect and respond to cyber attacks; (2) A detailed explanation of the devices that people use and their level of awareness of the sensors and components that these...
Enhancing the organisational culture related to cyber security during the university digital transformation
This article presents best practices of universities’ digitalisation from the cyber security and CRC point of view. ENISA’s CSC development guidance was used as the main tool for developing the general CSC programme for universities. The required changes of CSC and...
Cyber security @ home: The effect of home user perceptions of personal security performance on household IoT security intentions
This study explored potential human factors predictors of home user security intentions through the lens of past performance, perceived self-efficacy, and locus of control. While perceived self-efficacy and locus of control are elements in several organizational and...
Get yourself cybersecure for 2020
The Guardian
Password Breach of Game Developer Zynga Compromises 170 Million Accounts
CPO Magazine
Cybersecurity culture: The seven things businesses should be measuring
ITProPortal
Cyber influence of human behavior: Personal and national security, privacy, and fraud awareness to prevent harm
The Internet and connected technology platforms have enabled an increase of cyber influence activity. These actions target a range of personal to national level security and privacy attributes related to cybercrime, behavior, and identities. These emerging threats...
Love playing Draw Something or Words With Friends? Change your password now
TechRadar Pro
MILLIONS OF BRITS USING WEAK AND ‘EXPOSED’ PASSWORDS FOR ONLINE ACCOUNTS, NEW ANALYSIS SHOWS
Data Protection Magazine
6 ways to keep your business premises secure this Christmas?
Talk Business
#Privacy: Studies show UK consumers vulnerable due to weak passwording
GDPR:Report
Why do some organizations use two lms security awareness training solutions at once?
Why do some organizations often use two or more security awareness training solutions at once? That’s a question that grabbed our attention when it popped up on social recently. The comment highlighted the following cyber security oddity… Increasing numbers of...
The effects of the property of access possibilities and cyber security awareness on social media application
Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe...
Millions of Brits using weak and ‘exposed’ passwords
Fudzilla
Exposed and weak passwords rife, warns CybSafe
Comms Dealer
Weak passwords leave UK businesses at risk of cyberattack
BetaNews
Almost three quarters of UK businesses employing staff with vulnerable passwords, CybSafe analysis reveals
IT Supply Chain
The Past, Present and Future of Cyber Security
Tech Nation
Internet of things & cyber security readiness in smart-government and organizations
We have studied the cybersecurity readiness for organizations in Kuwait to get a more information about how to build the cybersecurity readiness model. Cybersecurity readiness model is conceived from investigating the relationship among employee expertise, awareness,...
Improving employees’ intellectual capacity for cyber security through evidence-based malware training
This paper reports an in-depth investigation on how different evidence-based cybersecurity training methods impact employees’ perceptions of susceptibility, severity, self-efficacy, security intention as well as on their self-reported cybersecurity behaviors.
“Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so.”
Having the data and metrics available has allowed us to confidently make informed decisions and get tangible results regarding employee vigilance. We can now focus on the right areas and track our progress whilst doing so. Alexandre Pieyre, Group Information Security...