itb-nz logo
Story image

ESET: Ignoring human element in cyber safety a mistake

Neglecting the human element in cyber safety protocols could potentially expose businesses to cybercrime, according to IT security firm ESET. 

According to the Cyberchology paper, which investigates the link between personality types and vulnerabilities to cybercrime, which was launched by ESET and The Myers-Briggs Company, only four in 10 (42%) businesses focus on compliance training as part of their cybersecurity protocol to ensure sensitive data is kept secure. 

More worryingly, ESET says, is that 63% rely predominantly on passwords. 

The Cyberchology paper highlights that cybersecurity should be on every boardroom’s agenda. Management needs ongoing one on one meetings and training to highlight and mitigate potential vulnerabilities within teams.
 
Jake Moore, security specialist at ESE, says by leveraging ESET’s deep research capabilities, the Cyberchology paper highlights current cyber threats such as Formjacking, PowerShell and IoT attacks. 

"Cyberattacks are almost considered business as usual because they have become so frequent," says Moore. 

"Criminals’ modus operandi are extremely diverse and unpredictable and, aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses," he explains.
 
Moore says that securing the human element is vital in today’s fast-changing cyber landscape. 

"We are seeing a growing need for companies to streamline their teams’ cyber safety protocols," he says.
 
While the motivation behind a cyber-attack may be varied and impossible to predict, Moore says companies can take the time to learn more about their employees’ personalities and behavioural preferences to help them understand the role they play in securing company data.
 
Research collated by The Myers-Briggs Company that looked at individuals across Europe revealed that people who focus their attention on the outside world (Extraversion) are more vulnerable to manipulation and persuasion by cybercriminals. 

In contrast, people that lean towards Sensing preferences (people that observe and remember details) may be better suited to spotting risks as they arise. 

According to John Hackston, head of thought leadership at The Myers-Briggs Company, says identifying people’s potential strengths and weaknesses not only highlights how different team members may be at risk without even knowing it, but it can also be used to foster a collaborative team dynamic as members may call on each other’s strengths if there is something they are not sure of.
 
“When it comes to cyber safety protocols, we strongly advocate delivering a personalised cybersecurity management programme to employees," Hackston says. 

"We believe that when employees are aware of their potential blindspots, they are naturally more invested and better prepared to be wary of things that may not seem quite right," he explains. 

"By improving employees’ self-awareness, employers can maximise individual and team performance," adds Hackston. "This is particularly important in a fast-moving industry like cybersecurity, which combines constantly shifting challenges with the need to place trust in individuals.”

Link image
Network on TAP: Visibility made easy
Test Access Points (TAPS) connect to cabling infrastructure to conduct packet monitoring – and they’re the most effective way to copy traffic across a system. Put this tried-and-true visibility device to work for you today.More
Story image
SAP managed services to go on-premise with Red Hat
Through OpenShift virtualization, customers can host SAP's managed services on a secure, dedicated virtual infrastructure.More
Story image
Why DX is not complete without a transformed security architecture
Secure Access Services Edge (SASE) is the process by which core WAN edge capabilities like SD-WAN, routing, and WAN optimisation at branch locations are integrated with cloud-based security services like secure web gateways, firewall-as-a-service, cloud access security brokers, and more.More
Story image
Micro Focus launches solutions designed to aid modernisation
“Through new insight-driven tools, application program interface (API) development capabilities and robust deployment options, these Micro Focus solutions give developers new ways to work with complex COBOL and mainframe systems while delivering on a cloud strategy.”More
Story image
CFOs forge on ahead with global expansion
While almost half (45%) say they are expanding globally or plan to do so within the next year, 9% say they will wait another year.More
Story image
Vodafone sells Auckland customer data centre to Plan B
Plan B will take over both operations and management of the facility, while customers will see no difference in operations.More