Eskenzi PR Eskenzi PR
  • About Us
Friday, 23 April, 2021
IT Security Guru
Eskenzi PR
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

44CON CS – Fear can be the worst education tool

by The Gurus
June 4, 2020
in Editor's News
Share on FacebookShare on Twitter

Are users too affected by fear, uncertainty and doubt (FUD) and is there too much stick and not enough carrot?
Speaking at 44CON Cyber Security in London, psychologist and sociologist Dr Jessica Barker asked the audience if we are using fear too much and being too negative when it comes to awareness?
She claimed that part of society is impacted by fear and not using the internet as a result, while others are not so influenced so think of it is paranoia and engage in risky behaviour.
Referring to her own research and a survey done by Proofpoint, she found that 62 per cent of users don’t use unique passwords online, and 15-20 per cent share passwords in the workplace. “Those who are more worried are behaving better,” she said. “They are less likely to share passwords.”
She said that there is a tendency to blame users when they do things wrong, but instead we should work with them and empower them. “Information security is treating users for negative impacts that happen upon them. If something bad happens in someone’s life it is seen as their fault and victim blaming has been around for a long time,” she said.
Referring to research by “Rogers”, which said that you learn to change behaviours, as users do not learn under threat and develop a trust, or you will not change behaviours. “The biggest problem in information security is those who inspire fear in others, as security should be about recognising a way to identify and contain a threat,” she said.
“We will never have perfect behaviours, but if we make a difference and a change, others can learn from that. If we expect negativity we will get it back.”
Dr Barker said that fear is nebulas and as new as the internet, and as we don’t understand the threat it is hard to define something as it is not a natural threat.
She said: “Fear was an emotion and if you see something scary, you defend yourself against it. It is seen by sociologists as not just an emotion, but as a social construct as you see something and respond to it.
“Who you are and how you understand a threat determines how you engage with them.”
Looking at public awareness initatives and “Fear Appeals” campaigns, Dr Barker said that some people think that cyber security is a real threat and ask “am I susceptible to it”, and you decide how you determine if something is a real threat.
Dr Barker concluded by saying that we use fear as some can scare people and as we are always talking about threats, we are always negative. “But the assumption is that if you scare someone you can control them and unless you empower them, they have worse behaviours than you actually wanted,” she said.

0 0 vote
Article Rating
FacebookTweetLinkedIn
Tags: 44CONAwarenessCyberCyber Securityinformation securitypasswordpasswordsproofpoint
ShareTweetShare
Previous Post

Lizard Squad ties to Tesla Motors’ website and twitter hack

Next Post

44CON CS – Be an inspirational leader in a quantifiable herd

Subscribe
Notify of
guest
guest
0 Comments
Inline Feedbacks
View all comments

Recent News

messaging apps - signal

Signal CEO hacks mobile-hacking firm

April 22, 2021
New UK laws to protect IoT devices amid sales surge

New UK laws to protect IoT devices amid sales surge

April 22, 2021
edgescan logo

PRODUCT REVIEW – Edgescan makes fullstack vulnerability management easy

April 21, 2021
The clubhouse app

Armis and UK’s Eseye partner to secure connected devices on any cellular network

April 20, 2021

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Women in Cyber 2020
    • Women in Cyber 2020 [SPONSORS]
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

More information
wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply
Privacy Settings / PENDINGGDPR Compliance

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Accept