A CISO’s Guide: Mitigating the Human Risk Factor
Security teams deploy several technologies to protect their attack vectors (network, endpoints, email, web, cloud apps, etc.). But what about the human attack surface?
Verizon’s 2021 data breach report shows phishing is responsible for the vast majority of breaches and Business Email Compromises were the second most common form of social engineering. Hackers tap into human cognitive biases to sway users’ decisions based on irrelevant or misleading information.
Download this guide to better understand what makes users click when they shouldn’t.
- Nine cognitive biases used by hackers.
- The Nudge theory and how it’s used in cybersecurity to combat behavioral biases.
- Six steps for a cyber immune culture.
This guide is no longer available.