Cyber Psychology

Human beings have created an entirely new virtual world in which to interact, but just three decades ago only a few people regularly accessed the Internet, but now the majority of the Globe’s population are on-line. And now human error is mainly responsible for most cyber-attacks and so business management cannot ignore the impact of human traits and characteristics on employee cyber security habits. 

From the printing press to the rise of film photography, new technology has always played a role in the ways humans think about the world and their position in it. 

To help make sense of it all, and to provide effective solutions to unintended severe mental health problems that arise from online technology, researchers have developed a new field: cyber psychology. Rapid technological progress in the last 30 years, though, has intensely altered the way we interact with each other. As a result, the way we think is notably differently as we consume new information, communicate with others, and internalise our feelings.

Cyber psychology is the study of the human mind and behavior and how the culture of technology, specifically, virtual reality, and social media affect them. 

Mainstream research studies focus on the effect of the Internet and cyberspace on the psychology of individuals and groups.
has long been thought of as the responsibility of IT, but to build a holistic cyber security strategy that accounts for the human factor, IT, HR and senior management must work together. 

Using psychometric testing and self-awareness tools, HR can help to identify the make-up of teams and pinpoint where potential vulnerabilities exist. IT teams can use this insight.

That is the background to a joint white paper from the cyber firm ESET and the personality and ability assessment firm The Myers-Briggs Company “Cyberchology: The Human Element”. It argues for a holistic cyber security strategy that takes individual personalities into account alongside IT systems and software. 

The report speaks in terms of IT resilience; confident employees who are educated on cybersecurity best practice as the foundation of a resilient strategy.

Most cyber-attacks are successful not because of the hacker’s skill, but due to human error or oversight. and  a significant challenge during COVID-19 has been the increase in cyber security risk, caused by the human factor.  The report says: “The ways in which people prefer to digest information and communicate can play a role in how different team members approach cybersecurity, as all personality types have different strengths and blind spots that can impact the outcome of a cybersecurity attack.”

The Myers-Briggs Type Indicator personality model looks at four areas of personality type – Extraversion or Introversion, Sensing or Intuition, Thinking or Feeling and Judging or Perceiving.

Concerning the findings of the Cyberchology paper, Jake Moore at ESET said: “Remote working has brought greater flexibility to the workforce, but has also dramatically altered business processes and systems.... The combination of fractured IT systems, a lack of central security, the sudden shift to home working, and a global climate of stress and concern is a perfect breeding ground for a successful cyber attack. The fact that only a quarter of businesses have faith in their own remote working strategy is shocking, and shows there is much work to be done to secure working from home.”

While Cybersecurity is mistakenly considered by many organisations to be the exclusive responsibility of IT departments,  a resilient holistic cybersecurity strategy must include HR departments which, through the use of psychometric testing and self-awareness tools, can help to identify the best composition of teams and pinpoint potential vulnerabilities.

This method will help IT teams to create a more comprehensive security cyber strategy to their organisation keep on top of potential threats.

Professional Security:       CACM:       ESET:    King University:   The Myers Briggs

You Might Also Read: 

Five Ways HR Can Improve Cyber Security:

 

« Using Artificial Intelligence In Business
The Rise and Fall Of America’s Unregulated Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

Magic Software Enterprises

Magic Software Enterprises

Magic provide Mobile Device Management (MDM) for Secure Enterprise Mobility. Magic MDM overcomes the challenges of mobile device management security by protecting all of your devices, data and content

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Grupo CFI

Grupo CFI

Grupo CFI is the largest Spanish network of data protection and cybersecurity professionals.

NeuroChain

NeuroChain

NeuroChain is an intelligent ecosystem that is more secure, more reliable and much faster than blockchain.

Startups.be

Startups.be

Startups.be helps tech entrepreneurs to be successful by providing quality access to service providers, business partners, customers and investors.

CertiPath

CertiPath

CertiPath create products and services that ensure the highest levels of validation for digital identities that attempt to access customers’ networks.

Neptune Cyber

Neptune Cyber

Neptune is a cyber security company that works exclusively in the marine sector. Our team combines experts in shipbuilding, maintenance and operations and cyber security testing and design.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce Cybersecurity Technology Research Network

Rolls-Royce has partnered with Purdue University and Carnegie Mellon University to create the Rolls-Royce Cybersecurity Technology Research Network.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

FusionAuth

FusionAuth

FusionAuth is the customer authentication and authorization platform that makes developers' lives awesome.

Framework Security

Framework Security

With Framework Security, you get more than a consultancy; you get a partner dedicated to simplifying cybersecurity and protecting your business in the most efficient way possible.

Judy Security

Judy Security

Judy (formerly AaDya Security) provides smart, simple, effective, all-in-one cybersecurity for SMBs. Get the 24/7 protection and support you deserve, at a price you can afford.

Reveald

Reveald

Reveald is making Exposure Management a reality to solve the biggest challenges in cybersecurity with a trailblazing ‘offense to defense’ approach that gives the advantage back to the business.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.