Cyber Psychology

Human beings have created an entirely new virtual world in which to interact, but just three decades ago only a few people regularly accessed the Internet, but now the majority of the Globe’s population are on-line. And now human error is mainly responsible for most cyber-attacks and so business management cannot ignore the impact of human traits and characteristics on employee cyber security habits. 

From the printing press to the rise of film photography, new technology has always played a role in the ways humans think about the world and their position in it. 

To help make sense of it all, and to provide effective solutions to unintended severe mental health problems that arise from online technology, researchers have developed a new field: cyber psychology. Rapid technological progress in the last 30 years, though, has intensely altered the way we interact with each other. As a result, the way we think is notably differently as we consume new information, communicate with others, and internalise our feelings.

Cyber psychology is the study of the human mind and behavior and how the culture of technology, specifically, virtual reality, and social media affect them. 

Mainstream research studies focus on the effect of the Internet and cyberspace on the psychology of individuals and groups.
has long been thought of as the responsibility of IT, but to build a holistic cyber security strategy that accounts for the human factor, IT, HR and senior management must work together. 

Using psychometric testing and self-awareness tools, HR can help to identify the make-up of teams and pinpoint where potential vulnerabilities exist. IT teams can use this insight.

That is the background to a joint white paper from the cyber firm ESET and the personality and ability assessment firm The Myers-Briggs Company “Cyberchology: The Human Element”. It argues for a holistic cyber security strategy that takes individual personalities into account alongside IT systems and software. 

The report speaks in terms of IT resilience; confident employees who are educated on cybersecurity best practice as the foundation of a resilient strategy.

Most cyber-attacks are successful not because of the hacker’s skill, but due to human error or oversight. and  a significant challenge during COVID-19 has been the increase in cyber security risk, caused by the human factor.  The report says: “The ways in which people prefer to digest information and communicate can play a role in how different team members approach cybersecurity, as all personality types have different strengths and blind spots that can impact the outcome of a cybersecurity attack.”

The Myers-Briggs Type Indicator personality model looks at four areas of personality type – Extraversion or Introversion, Sensing or Intuition, Thinking or Feeling and Judging or Perceiving.

Concerning the findings of the Cyberchology paper, Jake Moore at ESET said: “Remote working has brought greater flexibility to the workforce, but has also dramatically altered business processes and systems.... The combination of fractured IT systems, a lack of central security, the sudden shift to home working, and a global climate of stress and concern is a perfect breeding ground for a successful cyber attack. The fact that only a quarter of businesses have faith in their own remote working strategy is shocking, and shows there is much work to be done to secure working from home.”

While Cybersecurity is mistakenly considered by many organisations to be the exclusive responsibility of IT departments,  a resilient holistic cybersecurity strategy must include HR departments which, through the use of psychometric testing and self-awareness tools, can help to identify the best composition of teams and pinpoint potential vulnerabilities.

This method will help IT teams to create a more comprehensive security cyber strategy to their organisation keep on top of potential threats.

Professional Security:       CACM:       ESET:    King University:   The Myers Briggs

You Might Also Read: 

Five Ways HR Can Improve Cyber Security:

 

« Using Artificial Intelligence In Business
The Rise and Fall Of America’s Unregulated Internet »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

SSLGURU

SSLGURU

SSLGURU bring all of the major SSL certificate vendors to one market place in order to create the world's largest SSL store with the most competitive prices.

Latvian Information & Communications Technology Association (LIKTA)

Latvian Information & Communications Technology Association (LIKTA)

LIKTA brings together leading Latvian companies, organizations and professionals in the field of Information & Communications Technology

SysTools

SysTools

SysTools provides a range of services including data recovery, digital forensics, and cloud backup solutions.

Saudi Federation for Cyber Security and Programming (SAFCSP)

Saudi Federation for Cyber Security and Programming (SAFCSP)

SAFCSP is a national institution under the umbrella of the Saudi Arabian Olympic Committee, which seeks to build national and professional capabilities in the fields of cyber security and programming.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

42Gears

42Gears

42Gears is a leading Unified Endpoint Management provider. Secure, monitor and manage tablets, phones, desktops and wearables.

Leadcomm

Leadcomm

Leadcomm is a Brazilian company focused on the distribution and integration of IT systems and security solutions for large companies.

Cyber Security Africa

Cyber Security Africa

Cyber Security Africa is a full-service Information Security Consulting firm offering a comprehensive range of Services and Products to help organizations protect their valuable assets.

ISA Global Cybersecurity Alliance (ISAGCA)

ISA Global Cybersecurity Alliance (ISAGCA)

Objectives of the ISA Global Cybersecurity Alliance include the acceleration and expansion of standards, certification, education programs, advocacy efforts, and thought leadership.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Infinipoint

Infinipoint

Infinipoint pioneers the first Device-Identity-as-a-Service (DIaaS) solution, addressing Zero Trust device access and enabling enterprises of all sizes to automate cyber hygiene.

Corsearch

Corsearch

Combining AI-powered technology and decades of industry expertise, Corsearch is revolutionizing how companies establish and protect their brands.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

Bulletproof Solutions

Bulletproof Solutions

Bulletproof provides IT expert support, services, and guidance to businesses small and large as they grow and adapt to today’s complex IT, cybersecurity, and compliance needs.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.