CybSafe
  • Solutions
        • Traditional security
          awareness is not enough.

        • It’s time to adapt.

        • Start free
        • I want to


        • Improve security awareness
          Provide simulated phishing and social engineering
          Assess security culture
          Get advanced data and metrics about human cyber risk
          Measure security behaviour
          Support and assist people wherever they are
        • Financial services: making the new hybrid working world work

          Financial Services Ebook
        • Financial services: making the new hybrid working world work
          download the ebook

  • Customers
    • Success stories
    • Testimonials
    • Help centre
  • Partners
  • Resources
    • SebDB
    • Blog
    • Whitepapers
    • eBooks
    • Events
    • Webinars
    • Research library
  • About us
    • About CybSafe
    • Leadership team
    • Contact us
  • Careers
  • Why CybSafe
  • Demo
  • Login
Select Page

Productive security: A scalable methodology for analysing employee security behaviours

Jun 22, 2016 | Research

Organisational security policies are often written without sufficiently taking in to account the goals and capabilities of the employees that must follow them. Effective security management requires that security managers are able to assess the effectiveness of their...

“Comply or die is dead”: Long live security-aware principal agents

Jul 2, 2013 | Research

Information security has adapted to the modern collaborative organisational nature, and abandoned “command-and-control” approaches of the past. But when it comes to managing employee’s information security behaviour, many organisations still use policies proscribing...

The compliance budget: Managing security behaviour in organisations

Sep 9, 2008 | Research

This paper finds individuals comply with security practices up to a certain point only, after which point compliance wains. Organisations can influence an individual’s perception of where the compliance threshold lies so long as they know of and can manipulate...
Sign up

Recent Posts

  • Webinar: Reducing phishing risk in the insurance industry
  • How to make money with law firms and ransomware
  • Webinar: How to attack law firms using ransomware
  • Triple-pronged Threat: The Cyber Security Challenge
  • Financial services: making the new hybrid working world work