Category: Uncategorized
-
The Psychology of Cyber Wargaming
“It’s not if, it’s when!” You may have heard this common phrase as firms across the globe ask themselves if they will ever experience a breach. From government, finance, healthcare, manufacturing and media, no industry is immune from the throngs of cyber-attacks that are taking place on a daily basis. Gone are the days where…
-
Cognitive Dissonance in The End User: Examining Attitude for Behavior Change
Cognitive dissonance refers to the uncomfortable feeling that occurs when there is a conflict between one’s belief and behavior. This unsettling feeling brings about intense motivation to get rid of the inconsistency. An individual experiencing dissonance has three optional courses of action in order to minimize the dissonance (1) change the behavior, (2) change the…
-
Positive Behavior Support (PBS) to Combat Phishing
Positive Behavior Support (PBS) is a philosophy for helping individuals whose problem behaviors are barriers to reaching their goals. It is based on the well-researched science of Applied Behavior Analysis (ABA). A key component is understanding that behaviors occur for a reason and can be predicted by knowing what happens before and after those behaviors.…
-
Attracting Millennials to Cybersecurity
As Millennials will account for 75% of the workforce by 2030, I wanted to dig deeper into this generation’s working habits and preferences to best understand how to close the cybersecurity industry’s 0% unemployment gap and retain employees on a long-term basis. The Deloitte 2017 Millennial Survey gives us a better understanding of this generations…
-
How Women Will Disrupt Cybersecurity
“When dealing with people, remember you are not dealing with creatures of logic, but creatures of emotion.” -Dale Carnegie The Security Culture Report 2017 – Indepth Insights into the Human Factor, a study done by CLTRe Research, looks at how age, experience, gender and attitudes influence risky behaviors and security culture. The findings highlight how…
-
7 Dimensions of Security Culture
# 1: Attitude #2 Behavior # 3: Cognition #4: Compliance # 5: Communication # 6: Norms #7: Responsibilities Conclusion:
-
Risky Business
The Presidential Executive Order on Strengthening the Cyber Security of Federal Networks and Critical Infrastructure was issued last week as a reaction to the threats from Russian attackers and increased cyber attacks, like the global WunnaCry ransomware attack that recently hit. The release explicitly states that the “President will hold heads of executive departments and…
-
The Beginnings of Cyber Security
Can you remember 30 years ago? Back when Madonna was playing on the radio, Arnold Schwarzenegger was still wearing spandex, and Ronald Reagan had announced the Strategic Defense Initiative? The 80s were an age of economic boom and many of the technologies that we use today were birthed during this time. Microsoft Disk Operating System…