CybSafe
  • Home
  • Behaviour-IQ
  • CybSafe Connect app
  • SebDB
  • About us
  • Login
Select Page

Cyber security awareness campaigns: Why do they fail to change behaviour?

May 22, 2019 | Research

The present paper focuses on Cyber Security Awareness Campaigns, and aims to identify key factors regarding security which may lead them to failing to appropriately change people’s behaviour. Past and current efforts to improve information-security practices and...

Unwinding Ariadne’s identity thread: Privacy risks with fitness trackers and online social networks

Apr 9, 2017 | Research

The recent expansion of Internet of Things (IoT) and the growing trends towards a healthier lifestyle, have been followed by a proliferation in the use of fitness-trackers in our daily life. These wearable IoT devices combined with the extensive use by individuals of...

Towards a usable framework for modelling security and privacy risks in the smart home

Jul 4, 2016 | Research

The Internet-of-Things (IoT) ushers in a new age where the variety and amount of connected, smart devices present in the home is set to increase substantially. While these bring several advantages in terms of convenience and assisted living, security and privacy risks...

Smart insiders: Exploring the threat from insiders using the Internet-of-Things

Sep 21, 2015 | Research

The Internet-of-Things (IoT) is set to be one of the most disruptive technology paradigms since the advent of the Internet itself. Market research company Gartner estimates that around 4.9 billion connected things will be in use in 2015, and around 25 billion by 2020....

A critical reflection on the threat from human insiders– its nature, industry perceptions, and detection approaches

Jul 4, 2014 | Research

Organisations today operate in a world fraught with threats, including “script kiddies”, hackers, hacktivists and advanced persistent threats. Although these threats can be harmful to an enterprise, a potentially more devastating and anecdotally more likely threat is...
« Older Entries
Sign up

Recent Posts

  • How to build good cyber security habits
  • Three approaches to help you stay secure with remote working
  • The 4 key factors for a successful phishing simulation
  • Why Phishing Training Is Important
  • How successful was the UK’s National Cyber Security Strategy (NCSS) 2016-2021?
cybsafe icon teal

CybSafe

Why CybSafe?

Borderless security awareness

Product

Product

Our technology

Awareness Hub

Behaviour Change Hub

Culture Hub

Managed Service Hub

Pricing

Customers

Our customers

Case studies

Support

Partners

Become a partner

Partner portal

Resources

All resources

Blog

Webinars

Whitepapers

Research library

Help

Help centre

Contact us

Company

About us

About our team

About Research & Analysis

Events

Press

Careers

Legal

CybStore

  • Follow
  • Follow
Copyright © 2021 CybSafe Ltd. All Rights Reserved. 
Privacy policy | Cookies policy | Terms of website use