Cyber Psychology

Human beings have created an entirely new virtual world in which to interact, but just three decades ago only a few people regularly accessed the Internet, but now the majority of the Globe’s population are on-line. And now human error is mainly responsible for most cyber-attacks and so business management cannot ignore the impact of human traits and characteristics on employee cyber security habits. 

From the printing press to the rise of film photography, new technology has always played a role in the ways humans think about the world and their position in it. 

To help make sense of it all, and to provide effective solutions to unintended severe mental health problems that arise from online technology, researchers have developed a new field: cyber psychology. Rapid technological progress in the last 30 years, though, has intensely altered the way we interact with each other. As a result, the way we think is notably differently as we consume new information, communicate with others, and internalise our feelings.

Cyber psychology is the study of the human mind and behavior and how the culture of technology, specifically, virtual reality, and social media affect them. 

Mainstream research studies focus on the effect of the Internet and cyberspace on the psychology of individuals and groups.
has long been thought of as the responsibility of IT, but to build a holistic cyber security strategy that accounts for the human factor, IT, HR and senior management must work together. 

Using psychometric testing and self-awareness tools, HR can help to identify the make-up of teams and pinpoint where potential vulnerabilities exist. IT teams can use this insight.

That is the background to a joint white paper from the cyber firm ESET and the personality and ability assessment firm The Myers-Briggs Company “Cyberchology: The Human Element”. It argues for a holistic cyber security strategy that takes individual personalities into account alongside IT systems and software. 

The report speaks in terms of IT resilience; confident employees who are educated on cybersecurity best practice as the foundation of a resilient strategy.

Most cyber-attacks are successful not because of the hacker’s skill, but due to human error or oversight. and  a significant challenge during COVID-19 has been the increase in cyber security risk, caused by the human factor.  The report says: “The ways in which people prefer to digest information and communicate can play a role in how different team members approach cybersecurity, as all personality types have different strengths and blind spots that can impact the outcome of a cybersecurity attack.”

The Myers-Briggs Type Indicator personality model looks at four areas of personality type – Extraversion or Introversion, Sensing or Intuition, Thinking or Feeling and Judging or Perceiving.

Concerning the findings of the Cyberchology paper, Jake Moore at ESET said: “Remote working has brought greater flexibility to the workforce, but has also dramatically altered business processes and systems.... The combination of fractured IT systems, a lack of central security, the sudden shift to home working, and a global climate of stress and concern is a perfect breeding ground for a successful cyber attack. The fact that only a quarter of businesses have faith in their own remote working strategy is shocking, and shows there is much work to be done to secure working from home.”

While Cybersecurity is mistakenly considered by many organisations to be the exclusive responsibility of IT departments,  a resilient holistic cybersecurity strategy must include HR departments which, through the use of psychometric testing and self-awareness tools, can help to identify the best composition of teams and pinpoint potential vulnerabilities.

This method will help IT teams to create a more comprehensive security cyber strategy to their organisation keep on top of potential threats.

Professional Security:       CACM:       ESET:    King University:   The Myers Briggs

You Might Also Read: 

Five Ways HR Can Improve Cyber Security:

 

« Using Artificial Intelligence In Business
The Rise and Fall Of America’s Unregulated Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

Cryptovision

Cryptovision

Cryptovision GmbH is one of the leading specialists for modern, user-friendly cryptography and solutions for secure electronic identities.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Ascend Technologies

Ascend Technologies

Ascend Technologies offers a full suite of managed IT services including: Cloud & Infrastructure Management, Cybersecurity Management, Service Desk Management, Application Management , Data Management

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Datenschutz Schmidt

Datenschutz Schmidt

Datenschutz Schmidt is a service provider with many years of experience, we support you in complying with numerous data protection guidelines, requirements and laws.

Cyber Bytes Foundation

Cyber Bytes Foundation

Cyber Bytes Foundation exists to establish and sustain a unique Cyber Ecosystem to accelerate the development of a strong Cyber workforce and support community outreach programs.

ImmuneBytes

ImmuneBytes

ImmuneBytes is a cutting-edge security startup that aims to provide a secure blockchain environment for a dependable and open Web3 ecosystem.

UK Cyber Cluster Collaboration (UKC3)

UK Cyber Cluster Collaboration (UKC3)

UKC3 has been launched to support Cyber Clusters and encourage greater collaboration across regions and nations of the UK.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Inroad Technologies

Inroad Technologies

Inroad Technologies provide IT services that help keep your business computers, servers and networks secure and trouble-free.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.