4 Laws of Changing People’s Behavior
“Change is so damn tough, you can’t possibly imagine how tough it is and how incapable most of you are to change.”... Learn More
Opinions on security predictive behaviour
I’m sure you heard the theme many times over the past few years that the best ROI for cybersecurity spend, comes from... Learn More
The Marshmallow Theory
I’m sure we have all heard about the Marshmallow Theory. In the theory, a child was offered a choice between one marshmallow... Learn More
2018: Scariest Year of Evil Things on the Internet
Acts of evil on the internet are on the rise, according to the 2018 Internet of Evil Things survey. In its fourth... Learn More
Phishing attacks are more effective on Mobile Devices
Mobile devices are emerging as a primary gateway for phishing attacks aimed at stealing data. A mobile user is 18 times more... Learn More
What Matters in Behaviour Design
1. We humans are lazy. BJ Fogg has mapped out the six elements of simplicity that account for this reality. With this new insight,... Learn More
Majority of reported Aussie data breaches caused by human error
More than half of all the data breaches reported to Australia’s Information Commissioner under new laws were caused by human error. According... Learn More
Is Your Security Program Going Nowhere Fast?
Today’s security threats are real, and the business risks are tangible. Yet, many organisations manage their security program in a way that... Learn More
How to sell cyber security to your executive team
It’s a constant battle between profitable business investments and “unprofitable” security investments to protect the current bottom-line. Despite the headlines, growth-oriented executives... Learn More
Cyber security a shared responsibility
The ‘‘year of the hack’’ — it’s a phrase we’ve heard constantly in the media and IT industry for the past few... Learn More