cisomag.eccouncil.org Open in urlscan Pro
2606:4700::6812:14fb  Public Scan

URL: https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/
Submission: On March 09 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://cisomag.eccouncil.org/

<form method="get" class="td-search-form" action="https://cisomag.eccouncil.org/">
  <!-- close button -->
  <div class="td-search-close">
    <a href="#"><i class="td-icon-close-mobile"></i></a>
  </div>
  <div role="search" class="td-search-input">
    <span>Search</span>
    <input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
  </div>
</form>

GET https://cisomag.eccouncil.org/

<form method="get" class="td-search-form" action="https://cisomag.eccouncil.org/">
  <div role="search" class="td-head-form-search-wrap">
    <input class="needsclick" id="td-header-search" type="text" value="" name="s" autocomplete="off"><input class="wpb_button wpb_btn-inverse btn" type="submit" id="td-header-search-top" value="Search">
  </div>
</form>

Text Content

 * Magazine
   * FEBRUARY 2022
   * JANUARY 2022
   * CISO MAG – Archives
 * NEWS
   * GOVERNANCE
   * STARTUPS
   * BUDGET
   * WORKFORCE
   * PARTNERSHIPS
   * THREATS
   * DATA PRIVACY
   * Regulations & Compliance
 * FEATURES
   * Careers
   * Explainers
   * Market Trends Report
   * One Quick Question
   * Trends and Predictions
 * PODCASTS
 * Get Featured
   * READING ROOM
   * INTERVIEWS
   * WHITEPAPERS
   * INFOGRAPHICS
   * MARKET TRENDS REPORT
     * GLOBAL BLOCKCHAIN IMPACT
     * SECURITY INTELLIGENCE REPORT
     * CLOUD FORENSICS
     * DIGITAL FORENSICS
     * CYBERSECURITY HIRING
     * DATA SECURITY
     * ENDPOINT SECURITY
   * INNOVATOR’S CORNER
   * HOTSPOT
   * SPECIAL FEATURES
 * Videos
   * VIDEO INTERVIEWS
   * EVENT VIDEOS
   * WEEKLY NEWS
 * WEBINARS
 * EVENTS
   * Upcoming Events
   * Endorsed Events
   * E-Events
   * Masterclass


Search

Thursday, March 10, 2022
 * About us
 * Advisory Board
 * Careers
 * Write for CISO MAG
 * Editorial Calendar
 * Login


CISO MAG | Cyber Security Magazine

 * Magazine
   * FEBRUARY 2022
   * JANUARY 2022
   * CISO MAG – Archives
 * NEWS
   * GOVERNANCE
   * STARTUPS
   * BUDGET
   * WORKFORCE
   * PARTNERSHIPS
   * THREATS
   * DATA PRIVACY
   * Regulations & Compliance
 * FEATURES
   
   
   * 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY
     
     
     HOW TO PREVENT STEGANOGRAPHY ATTACKS
     
     
     HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE
     
     
     HOW CYBERCRIMINALS EXPLOIT QR CODES TO THEIR ADVANTAGE
     
     
     SMART OR STUPID? CYBERCRIMINAL GROUP NAMES DECODED!
     
     AllCareersExplainersMarket Trends ReportOne Quick QuestionTrends and
     Predictions
     
     
 * PODCASTS
 * Get Featured
   * READING ROOM
   * INTERVIEWS
   * WHITEPAPERS
   * INFOGRAPHICS
   * MARKET TRENDS REPORT
     * GLOBAL BLOCKCHAIN IMPACT
     * SECURITY INTELLIGENCE REPORT
     * CLOUD FORENSICS
     * DIGITAL FORENSICS
     * CYBERSECURITY HIRING
     * DATA SECURITY
     * ENDPOINT SECURITY
   * INNOVATOR’S CORNER
   * HOTSPOT
   * SPECIAL FEATURES
 * Videos
   * VIDEO INTERVIEWS
   * EVENT VIDEOS
   * WEEKLY NEWS
 * WEBINARS
 * EVENTS
   * Upcoming Events
   * Endorsed Events
   * E-Events
   * Masterclass



 * 
 * 
 * 
 * 
 * 
 * 

Home News “Psychology of Human Error” Could Help Businesses Prevent Security
Breaches
 * News
 * Threats


“PSYCHOLOGY OF HUMAN ERROR” COULD HELP BUSINESSES PREVENT SECURITY BREACHES

By
CISOMAG
-
September 12, 2020
SHARE
Facebook

Twitter





Several organizations are concerned about human errors that cause accidental
exposure of a company’s critical data. A joint study from Stanford University
Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%)
data breach incidents are caused by employees’ mistakes. The study “Psychology
of Human Error” highlighted that employees are unwilling to admit to their
mistakes if organizations judge them severely.

Understanding the psychology behind human errors helps organizations to know how
to prevent mistakes before they turn into data leaks. According to the study,
nearly 50% of the employees stated that they are “very” or “pretty” certain they
have made an error at work that could have led to security issues to their
company.


YOUNG V/S OLD EMPLOYEES

The study also revealed that younger employees are five times more likely to
admit to errors, while 50% of employees aged between 18-30 years stated they
have made mistakes compared to 10% of workers aged over 51.

“For older generations, self-presentation and respect in the workplace is hugely
important. They may be more reluctant to admit they have made a mistake because
they do not want to lose face. Businesses, therefore, need to deshame the
reporting of mistakes,” Hancock said.


YOUNG EMPLOYEES ARE EASY TO PHISH

The study highlighted that one in four employees (25%) said they have clicked on
a phishing email at work. Men are twice as likely as women to fall for phishing
scams, with 34% of male respondents stating that they have clicked on a
malicious link in a phishing email compared to 17% of women.

Surprisingly, older employees are less vulnerable to phishing scams. Only 8% of
workers aged over 51 said they clicked on a phishing link. Around 32% of
31-40-year-old employees admitted the same. “The older generation have, in many
ways, the potential tools and mindsets needed for detecting phishing attacks.
They have more life experience, and they tend to have strong, close networks,
which means they are good at detecting when something does not ‘feel’ quite
right. But if you are less experienced with these kinds of attacks, they are
going to be harder for you to spot,” Hancock added.

OTHER FINDINGS INCLUDE:

 * Nearly 45% of respondents cited distraction as the top reason for falling for
   a phishing scam.
 * 57% of remote workers admit they are more distracted when working from home.
 * The top reasons for clicking on phishing emails are the perceived legitimacy
   of the email (43%) and the fact that it appeared to have come from either a
   senior executive (41%) or a well-known brand (40%).

“Your employees are focused on the job you hired them to do and when faced with
to-do lists, distractions, and pressure to get things done quickly, cognitive
loads become overwhelming and mistakes can happen,” the study report concluded.



 * TAGS
 * Data Breaches
 * employees mistakes
 * human errors
 * Professor Jeff Hancock
 * security firm Tessian
 * Security incidents
 * Stanford University

SHARE
Facebook

Twitter




Previous articleEterbase Exchange Hacked, Attackers Stole $5.4 Mn Crypto Funds

Next articleZoom Beefs Up Security with Two-Factor Authentication
CISOMAG
https://cisomag.eccouncil.org/




RELATED ARTICLESMORE FROM AUTHOR


Features


3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY


News


FBI ISSUES A LOOKOUT FOR SIM SWAPPING ATTACKS


News


HOW REMOTE WORK INCREASE DIGITAL ANXIETY








LATEST ISSUE IS OUT!






--------------------------------------------------------------------------------


FOLLOW US FOR MORE UPDATES


--------------------------------------------------------------------------------



--------------------------------------------------------------------------------



CYBER SHOTS Quick, punchy updates on Cyber trends, news and links to free
resources. Only via Telegram and Signal. Join the groups now!

Click Here Click Here

MOST POPULAR


45% COMPANIES DON’T HAVE CYBERSECURITY LEADER: STUDY

CISOMAG - December 11, 2017


NEARLY HALF OF COMPANIES HAVE SUFFERED A DATA BREACH IN THE PAST YEAR: SURVEY

November 15, 2017


MOBILE MESSAGING APPS NEW HIDEOUT OF DARK WEB ACTIVITIES: STUDY

October 27, 2017


NSA HACKING CODE LIFTED FROM A PERSONAL COMPUTER IN U.S.: KASPERSKY

October 30, 2017


INSTAGRAM DATA BREACH! 49 MILLION USERS’ SENSITIVE DATA EXPOSED ONLINE

May 23, 2019

RECENT POSTS


3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY

February 23, 2022


HOW TO PREVENT STEGANOGRAPHY ATTACKS

February 22, 2022


HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE

February 21, 2022


HOW CYBERCRIMINALS EXPLOIT QR CODES TO THEIR ADVANTAGE

February 20, 2022


FBI ISSUES A LOOKOUT FOR SIM SWAPPING ATTACKS

February 15, 2022

CISOMAG is the handbook for Chief Information Security Officer (CISO)s, CXOs,
and every stakeholder of safe internet.
Contact us: cisomag@eccouncil.org


EVEN MORE NEWS


3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY

February 23, 2022


HOW TO PREVENT STEGANOGRAPHY ATTACKS

February 22, 2022


HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE

February 21, 2022

POPULAR CATEGORY

 * News2554
 * Threats1657
 * Features594
 * Partnerships215
 * Governance191
 * Startups161
 * Interviews121

 * Terms of Use
 * Privacy Policy
 * Advertise with us
 * Contact Us
 * MASTERCLASS

© CISOMAG 2020

WE CARE

Ensuring that you get the best experience is our only purpose for using cookies.
If you wish to continue, please accept. You are welcome to provide a controlled
consent by visiting the cookie settings. For any further queries or information,
please see our privacy policy.

Do not sell my personal information.
Cookie SettingsAccept
Manage consent
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these, the cookies that are categorized as necessary are
stored on your browser as they are essential for the working of basic
functionalities of the ...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
These cookies ensure basic functionalities and security features of the website,
anonymously.

CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is
set by GDPR Cookie Consent plugin. The cookie is used to store the user consent
for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11
monthsThe cookie is set by GDPR cookie consent to record the user consent for
the cookies in the category "Functional".cookielawinfo-checkbox-necessary11
monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to
store the user consent for the cookies in the category
"Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR
Cookie Consent plugin. The cookie is used to store the user consent for the
cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis
cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the
user consent for the cookies in the category
"Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie
Consent plugin and is used to store whether or not user has consented to the use
of cookies. It does not store any personal data.

Functional
Functional
Functional cookies help to perform certain functionalities like sharing the
content of the website on social media platforms, collect feedbacks, and other
third-party features.
Performance
Performance
Performance cookies are used to understand and analyze the key performance
indexes of the website which helps in delivering a better user experience for
the visitors.
Analytics
Analytics
Analytical cookies are used to understand how visitors interact with the
website. These cookies help provide information on metrics the number of
visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and
marketing campaigns. These cookies track visitors across websites and collect
information to provide customized ads.
Others
Others
Other uncategorized cookies are those that are being analyzed and have not been
classified into a category as yet.
SAVE & ACCEPT



MORE STORIES

Features


3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY

CISOMAG - February 23, 2022
0
The explosion of IoT technologies incited users and organizations to swiftly
adopt IoT devices to enhance process control and boost productivity. The rise
of...
 
Edit with Live CSS


Save
Write CSS OR LESS and hit save. CTRL + SPACE for auto-complete.


✕ Error. Try later. You have blocked Push Notifications. Follow these
instructions to enable Push Notifications. Subscribe to receive push
notifications on latest updates You are unsubscribed to Push Notifications You
are subscribed to Push Notifications SUBSCRIBE SUBSCRIBE UNSUBSCRIBE ⚡ by
 Webpushr
Would you like to receive notifications on latest cybersecurity news & updates?
YES NOT YET