Psycho-Cyberchology

Only four in 10 (42%) businesses focus on compliance training as part of their cybersecurity protocol to ensure sensitive data is kept secure, reports ESET. 
 
More worryingly, 63% rely predominantly on Passwords. This is according to the Cyberchology paper that investigates the link between personality types and vulnerabilities to cybercrime.
 
The report highlights that cybersecurity should be on every boardroom’s agenda. Management needs ongoing one on one meetings and training to highlight and mitigate potential vulnerabilities within teams.
 
Cyberattacks are almost considered business as usual because they have become so frequent. Criminals’ modus operandi is extremely diverse and unpredictable and, aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses.
 
What personality type are you?  
According to new research from ESET and Myers-Briggs, organisations engaging in the war against cyber security breaches can help themselves to a new weapon: Cyberchology, applying psychometric tests.
The Cyberchology Report found that as far as cyber security is concerned, different personality types have different strengths and weakness.
 
The Cyberchology Report looked at five personality types, which overlap: 
 
Extraverted personality — those that work out ideas by talking them through
People with a preference for sensing — those that observe and remember details
People with a preference for Feeling — those guided by personal values
And people with a “preference for Judging — those who are systematic or structured.
People with a preference for Thinking (those who solve problems with logic). 
 
It found that those with extraverted personality “tend to be more vulnerable to manipulation, deceit, and persuasion from cybercriminals”, or social engineering attacks. On the other hand, people with extraverted personality, because they tend to be highly tuned to external communication, “are generally faster to pick up on attacks coming in from outside.”
 
Phishing attacks are less likely to be effective if they are targeted at people with a preference for sensing. On the other hand, people with these personalities are more likely to take cyber security risks. There is a nuance here. It turns out that the cyber security risk takers are more likely to be people in this group who have a “preference for Perceiving and/or Extraversion
 
As for people who have a preference for feeling or judging, they “are more likely to fall victim to social engineering attacks than those with a preference for Thinking. But they also. tend to be more cautious and therefore more rigorous when following cyber security policies. However, the ‘Thinking’ group can over-estimate their own competence, leading to mistakes.
 
The ESET and The Myers-Briggs Company Cyberchology report suggests that psychometric tests can be used to build self-awareness, thereby reducing vulnerability to potential cyber security breaches. 
 
“Individuals and their managers (rather than IT departments and outside contractors) are the key players where cyber-security is concerned,” suggested the report. 
 
The Cyberchology paper highlights current cyber threats such as Formjacking, PowerShell and IoT attacks. 
 
“Cyber-attacks are almost considered business as usual because they have become so frequent,” it said and “criminals’ modus operandi are extremely diverse and unpredictable and, aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses.”
 
 
While the motivation behind a cyber-attack may be varied and impossible to predict, companies can take the time to learn more about their employees’ personalities and behavioural preferences to help them understand the role they play in securing company data.
 
Information Age:          TheMyersBriggs:        HelpNetSecurity:
 
You Might Also Read: 
 
Strategies For A Cyber Security Culture (£):
 
Five Hi -Tech Ways To Fight Off Cyber Attackers:
 
 
« Securing Your Organisation’s Office 365 Environment
The EU's New Cybersecurity Certification Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

OneSpan

OneSpan

OneSpan (formerly Vasco Data Security) is a global leader in digital identity security, transaction security and business productivity.

ThreatAdvice

ThreatAdvice

ThreatAdvice is a provider of cybersecurity education, awareness and threat intelligence.

Sandia National Laboratories

Sandia National Laboratories

Sandia National Laboratories is a premier science and engineering lab for national security and technology innovation.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

Search Guard

Search Guard

Search Guard® is an Open Source security suite for #Elasticsearch and the entire #ELK stack that offers encryption, authentication, authorization, audit logging and multi tenancy.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

TrafficGuard

TrafficGuard

TrafficGuard is an award-winning digital ad verification and fraud prevention platform.

RAD Security

RAD Security

RAD Security (formerly KSOC) is a cloud native security company that empowers engineering and security teams to drive innovation so they can focus on growth versus security problems.