Melbourne (03) 8672 2974 - Sydney (02) 8123 3003 - Brisbane (07) 3054 4312
information@layer8security.com.au

Designing a Security Champion Program

Mobilizing a security champion program gives security and risk management leaders a geographically and organizationally dispersed team of knowledgeable employees whose focus is to reinforce key security messages. Most security awareness programs lack the support to enable long-term behaviour change. Overview Key Challenges Most security awareness programs lack the necessary support resources — people and...
Learn More

4 Laws of Changing People’s Behavior

“Change is so damn tough, you can’t possibly imagine how tough it is and how incapable most of you are to change.” That’s how Keith Ferrazzi, author of “Who’s Got Your Back: The Breakthrough Program to Build Deep, Trusting Relationships That Create Success–and Won’t Let You Fail,” stated it. Now, extrapolate this out to cyber...
Learn More

Unintentional Breaches or Benign User Activities

Ask any insurance underwriter who provide Cyber Insurance, “What is the primary cause of Cyber Claims”, and you will hear, “Human Error”. Human error constitutes more than 50% of all cyber insurance claims. I acknowledge that some of these “Human Errors” are not accidental. Some are malignant or malicious. I will address this further in...
Learn More

Opinions on security predictive behaviour

I’m sure you heard the theme many times over the past few years that the best ROI for cybersecurity spend, comes from investing in your people’s security awareness. Although it doesn’t really look at their behaviour. Supporting quotes from the article below. According to the first Notifiable Data Breaches (NDB) quarterly report, published by the Office...
Learn More

The Marshmallow Theory

I’m sure we have all heard about the Marshmallow Theory. In the theory, a child was offered a choice between one marshmallow provided immediately or two marshmallows, if they waited for a brief period, approximately 20 minutes. Researchers found that children who were able to wait longer for the preferred rewards tended to have better...
Learn More

2018: Scariest Year of Evil Things on the Internet

Acts of evil on the internet are on the rise, according to the 2018 Internet of Evil Things survey. In its fourth consecutive year, the survey, conducted by Pwnie Express, polled more than 500 security professionals and found their collective responses to be “the scariest survey results we’ve seen yet.” The report indicates that security...
Learn More

CyberCrimes! Listen Up and Protect Yourself

Have you ever had your house burgled? Try putting into words how you felt (or would feel) when you returned home to the find every valuable possession made away with! The reality today is that the chances of being attacked are more than you could possibly imagine, especially ONLINE! Let’s put things in perspective with...
Learn More

What Matters in Behaviour Design

1. We humans are lazy. BJ Fogg has mapped out the six elements of simplicity that account for this reality. With this new insight, we can pinpoint why many designs fail to achieve results. Simplicity matters more than motivation when it comes to influencing people. 2. Hot triggers change people. Many people would argue that information matters...
Learn More

Malware, scams and ransomware on social media

The problem with social media is that people have an inherent trust and that is what is being tapped into by those cybercriminals. People still believe that you have to click on something and download a file to be infected. This really isn’t the case anymore. There are things like drive-by-downloads, infected adverts and things...
Learn More
1 2 3 8