cisomag.eccouncil.org
Open in
urlscan Pro
2606:4700::6812:14fb
Public Scan
URL:
https://cisomag.eccouncil.org/psychology-of-human-error-could-help-businesses-prevent-security-breaches/
Submission: On March 09 via api from US — Scanned from DE
Submission: On March 09 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMGET https://cisomag.eccouncil.org/
<form method="get" class="td-search-form" action="https://cisomag.eccouncil.org/">
<!-- close button -->
<div class="td-search-close">
<a href="#"><i class="td-icon-close-mobile"></i></a>
</div>
<div role="search" class="td-search-input">
<span>Search</span>
<input id="td-header-search-mob" type="text" value="" name="s" autocomplete="off">
</div>
</form>
GET https://cisomag.eccouncil.org/
<form method="get" class="td-search-form" action="https://cisomag.eccouncil.org/">
<div role="search" class="td-head-form-search-wrap">
<input class="needsclick" id="td-header-search" type="text" value="" name="s" autocomplete="off"><input class="wpb_button wpb_btn-inverse btn" type="submit" id="td-header-search-top" value="Search">
</div>
</form>
Text Content
* Magazine * FEBRUARY 2022 * JANUARY 2022 * CISO MAG – Archives * NEWS * GOVERNANCE * STARTUPS * BUDGET * WORKFORCE * PARTNERSHIPS * THREATS * DATA PRIVACY * Regulations & Compliance * FEATURES * Careers * Explainers * Market Trends Report * One Quick Question * Trends and Predictions * PODCASTS * Get Featured * READING ROOM * INTERVIEWS * WHITEPAPERS * INFOGRAPHICS * MARKET TRENDS REPORT * GLOBAL BLOCKCHAIN IMPACT * SECURITY INTELLIGENCE REPORT * CLOUD FORENSICS * DIGITAL FORENSICS * CYBERSECURITY HIRING * DATA SECURITY * ENDPOINT SECURITY * INNOVATOR’S CORNER * HOTSPOT * SPECIAL FEATURES * Videos * VIDEO INTERVIEWS * EVENT VIDEOS * WEEKLY NEWS * WEBINARS * EVENTS * Upcoming Events * Endorsed Events * E-Events * Masterclass Search Thursday, March 10, 2022 * About us * Advisory Board * Careers * Write for CISO MAG * Editorial Calendar * Login CISO MAG | Cyber Security Magazine * Magazine * FEBRUARY 2022 * JANUARY 2022 * CISO MAG – Archives * NEWS * GOVERNANCE * STARTUPS * BUDGET * WORKFORCE * PARTNERSHIPS * THREATS * DATA PRIVACY * Regulations & Compliance * FEATURES * 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY HOW TO PREVENT STEGANOGRAPHY ATTACKS HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE HOW CYBERCRIMINALS EXPLOIT QR CODES TO THEIR ADVANTAGE SMART OR STUPID? CYBERCRIMINAL GROUP NAMES DECODED! AllCareersExplainersMarket Trends ReportOne Quick QuestionTrends and Predictions * PODCASTS * Get Featured * READING ROOM * INTERVIEWS * WHITEPAPERS * INFOGRAPHICS * MARKET TRENDS REPORT * GLOBAL BLOCKCHAIN IMPACT * SECURITY INTELLIGENCE REPORT * CLOUD FORENSICS * DIGITAL FORENSICS * CYBERSECURITY HIRING * DATA SECURITY * ENDPOINT SECURITY * INNOVATOR’S CORNER * HOTSPOT * SPECIAL FEATURES * Videos * VIDEO INTERVIEWS * EVENT VIDEOS * WEEKLY NEWS * WEBINARS * EVENTS * Upcoming Events * Endorsed Events * E-Events * Masterclass * * * * * * Home News “Psychology of Human Error” Could Help Businesses Prevent Security Breaches * News * Threats “PSYCHOLOGY OF HUMAN ERROR” COULD HELP BUSINESSES PREVENT SECURITY BREACHES By CISOMAG - September 12, 2020 SHARE Facebook Twitter Several organizations are concerned about human errors that cause accidental exposure of a company’s critical data. A joint study from Stanford University Professor Jeff Hancock and security firm Tessian revealed that nine in 10 (88%) data breach incidents are caused by employees’ mistakes. The study “Psychology of Human Error” highlighted that employees are unwilling to admit to their mistakes if organizations judge them severely. Understanding the psychology behind human errors helps organizations to know how to prevent mistakes before they turn into data leaks. According to the study, nearly 50% of the employees stated that they are “very” or “pretty” certain they have made an error at work that could have led to security issues to their company. YOUNG V/S OLD EMPLOYEES The study also revealed that younger employees are five times more likely to admit to errors, while 50% of employees aged between 18-30 years stated they have made mistakes compared to 10% of workers aged over 51. “For older generations, self-presentation and respect in the workplace is hugely important. They may be more reluctant to admit they have made a mistake because they do not want to lose face. Businesses, therefore, need to deshame the reporting of mistakes,” Hancock said. YOUNG EMPLOYEES ARE EASY TO PHISH The study highlighted that one in four employees (25%) said they have clicked on a phishing email at work. Men are twice as likely as women to fall for phishing scams, with 34% of male respondents stating that they have clicked on a malicious link in a phishing email compared to 17% of women. Surprisingly, older employees are less vulnerable to phishing scams. Only 8% of workers aged over 51 said they clicked on a phishing link. Around 32% of 31-40-year-old employees admitted the same. “The older generation have, in many ways, the potential tools and mindsets needed for detecting phishing attacks. They have more life experience, and they tend to have strong, close networks, which means they are good at detecting when something does not ‘feel’ quite right. But if you are less experienced with these kinds of attacks, they are going to be harder for you to spot,” Hancock added. OTHER FINDINGS INCLUDE: * Nearly 45% of respondents cited distraction as the top reason for falling for a phishing scam. * 57% of remote workers admit they are more distracted when working from home. * The top reasons for clicking on phishing emails are the perceived legitimacy of the email (43%) and the fact that it appeared to have come from either a senior executive (41%) or a well-known brand (40%). “Your employees are focused on the job you hired them to do and when faced with to-do lists, distractions, and pressure to get things done quickly, cognitive loads become overwhelming and mistakes can happen,” the study report concluded. * TAGS * Data Breaches * employees mistakes * human errors * Professor Jeff Hancock * security firm Tessian * Security incidents * Stanford University SHARE Facebook Twitter Previous articleEterbase Exchange Hacked, Attackers Stole $5.4 Mn Crypto Funds Next articleZoom Beefs Up Security with Two-Factor Authentication CISOMAG https://cisomag.eccouncil.org/ RELATED ARTICLESMORE FROM AUTHOR Features 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY News FBI ISSUES A LOOKOUT FOR SIM SWAPPING ATTACKS News HOW REMOTE WORK INCREASE DIGITAL ANXIETY LATEST ISSUE IS OUT! -------------------------------------------------------------------------------- FOLLOW US FOR MORE UPDATES -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- CYBER SHOTS Quick, punchy updates on Cyber trends, news and links to free resources. Only via Telegram and Signal. Join the groups now! Click Here Click Here MOST POPULAR 45% COMPANIES DON’T HAVE CYBERSECURITY LEADER: STUDY CISOMAG - December 11, 2017 NEARLY HALF OF COMPANIES HAVE SUFFERED A DATA BREACH IN THE PAST YEAR: SURVEY November 15, 2017 MOBILE MESSAGING APPS NEW HIDEOUT OF DARK WEB ACTIVITIES: STUDY October 27, 2017 NSA HACKING CODE LIFTED FROM A PERSONAL COMPUTER IN U.S.: KASPERSKY October 30, 2017 INSTAGRAM DATA BREACH! 49 MILLION USERS’ SENSITIVE DATA EXPOSED ONLINE May 23, 2019 RECENT POSTS 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY February 23, 2022 HOW TO PREVENT STEGANOGRAPHY ATTACKS February 22, 2022 HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE February 21, 2022 HOW CYBERCRIMINALS EXPLOIT QR CODES TO THEIR ADVANTAGE February 20, 2022 FBI ISSUES A LOOKOUT FOR SIM SWAPPING ATTACKS February 15, 2022 CISOMAG is the handbook for Chief Information Security Officer (CISO)s, CXOs, and every stakeholder of safe internet. Contact us: cisomag@eccouncil.org EVEN MORE NEWS 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY February 23, 2022 HOW TO PREVENT STEGANOGRAPHY ATTACKS February 22, 2022 HOW BRAINJACKING BECAME A NEW CYBERSECURITY RISK IN HEALTH CARE February 21, 2022 POPULAR CATEGORY * News2554 * Threats1657 * Features594 * Partnerships215 * Governance191 * Startups161 * Interviews121 * Terms of Use * Privacy Policy * Advertise with us * Contact Us * MASTERCLASS © CISOMAG 2020 WE CARE Ensuring that you get the best experience is our only purpose for using cookies. If you wish to continue, please accept. You are welcome to provide a controlled consent by visiting the cookie settings. For any further queries or information, please see our privacy policy. Do not sell my personal information. Cookie SettingsAccept Manage consent Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the ... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously. CookieDurationDescriptioncookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. Functional Functional Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features. Performance Performance Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors. Analytics Analytics Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc. Advertisement Advertisement Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads. Others Others Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet. SAVE & ACCEPT MORE STORIES Features 3 COMMON IOT ATTACKS THAT COMPROMISE SECURITY CISOMAG - February 23, 2022 0 The explosion of IoT technologies incited users and organizations to swiftly adopt IoT devices to enhance process control and boost productivity. The rise of... Edit with Live CSS Save Write CSS OR LESS and hit save. CTRL + SPACE for auto-complete. ✕ Error. Try later. You have blocked Push Notifications. Follow these instructions to enable Push Notifications. Subscribe to receive push notifications on latest updates You are unsubscribed to Push Notifications You are subscribed to Push Notifications SUBSCRIBE SUBSCRIBE UNSUBSCRIBE ⚡ by Webpushr Would you like to receive notifications on latest cybersecurity news & updates? YES NOT YET