Psycho-Cyberchology

Only four in 10 (42%) businesses focus on compliance training as part of their cybersecurity protocol to ensure sensitive data is kept secure, reports ESET. 
 
More worryingly, 63% rely predominantly on Passwords. This is according to the Cyberchology paper that investigates the link between personality types and vulnerabilities to cybercrime.
 
The report highlights that cybersecurity should be on every boardroom’s agenda. Management needs ongoing one on one meetings and training to highlight and mitigate potential vulnerabilities within teams.
 
Cyberattacks are almost considered business as usual because they have become so frequent. Criminals’ modus operandi is extremely diverse and unpredictable and, aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses.
 
What personality type are you?  
According to new research from ESET and Myers-Briggs, organisations engaging in the war against cyber security breaches can help themselves to a new weapon: Cyberchology, applying psychometric tests.
The Cyberchology Report found that as far as cyber security is concerned, different personality types have different strengths and weakness.
 
The Cyberchology Report looked at five personality types, which overlap: 
 
Extraverted personality — those that work out ideas by talking them through
People with a preference for sensing — those that observe and remember details
People with a preference for Feeling — those guided by personal values
And people with a “preference for Judging — those who are systematic or structured.
People with a preference for Thinking (those who solve problems with logic). 
 
It found that those with extraverted personality “tend to be more vulnerable to manipulation, deceit, and persuasion from cybercriminals”, or social engineering attacks. On the other hand, people with extraverted personality, because they tend to be highly tuned to external communication, “are generally faster to pick up on attacks coming in from outside.”
 
Phishing attacks are less likely to be effective if they are targeted at people with a preference for sensing. On the other hand, people with these personalities are more likely to take cyber security risks. There is a nuance here. It turns out that the cyber security risk takers are more likely to be people in this group who have a “preference for Perceiving and/or Extraversion
 
As for people who have a preference for feeling or judging, they “are more likely to fall victim to social engineering attacks than those with a preference for Thinking. But they also. tend to be more cautious and therefore more rigorous when following cyber security policies. However, the ‘Thinking’ group can over-estimate their own competence, leading to mistakes.
 
The ESET and The Myers-Briggs Company Cyberchology report suggests that psychometric tests can be used to build self-awareness, thereby reducing vulnerability to potential cyber security breaches. 
 
“Individuals and their managers (rather than IT departments and outside contractors) are the key players where cyber-security is concerned,” suggested the report. 
 
The Cyberchology paper highlights current cyber threats such as Formjacking, PowerShell and IoT attacks. 
 
“Cyber-attacks are almost considered business as usual because they have become so frequent,” it said and “criminals’ modus operandi are extremely diverse and unpredictable and, aside from a reputable and trustworthy cyber solution, having a solid front line of employees who are armed with ample information and support is critical for businesses.”
 
 
While the motivation behind a cyber-attack may be varied and impossible to predict, companies can take the time to learn more about their employees’ personalities and behavioural preferences to help them understand the role they play in securing company data.
 
Information Age:          TheMyersBriggs:        HelpNetSecurity:
 
You Might Also Read: 
 
Strategies For A Cyber Security Culture (£):
 
Five Hi -Tech Ways To Fight Off Cyber Attackers:
 
 
« Securing Your Organisation’s Office 365 Environment
The EU's New Cybersecurity Certification Framework »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

bwtech@UMBC

bwtech@UMBC

The bwtech@UMBC Cyber Incubator is an innovative business incubation program that delivers business and technical support to start-up and early-stage cybersecurity/IT products and services companies.

Cyxtera Technologies

Cyxtera Technologies

Cyxtera offers powerful, secure IT infrastructure capabilities paired with agile, dynamic software-defined security.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Adaptive Shield

Adaptive Shield

Addaptive Shield - Complete Control For Your SaaS Security. Proactively find and fix weaknesses across your SaaS platforms.

International Cybersecurity Forum (FIC)

International Cybersecurity Forum (FIC)

The International Cybersecurity Forum (FIC) has established itself as the benchmark event in Europe in terms of digital security and trust.

Digital Craftsmen Ltd

Digital Craftsmen Ltd

We're ISO27001 & Cyber Essentials Cybersecurity experts, delivering full cloud security and managed services. We take a bespoke approach for each client from hosting, optimising & securing them online

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Vala Secure

Vala Secure

Vala Secure is a cybersecurity and compliance consultancy that always stays ahead of regulations, future threats and ever-changing security environments.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Icon Information Systems (ICONIS)

Icon Information Systems (ICONIS)

ICONIS is an integrated infrastructure and service provider, offering unified Information Technology (IT) solutions globally.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.