The IT Pro Podcast: The psychology of security

How hackers exploit our brains as well as our binary

Security is an unusual field; while it’s one of the fastest-moving areas of IT in some ways, in other aspects it hasn’t changed in decades. For example, phishing, business email compromise and physical infiltration tactics have remained largely unchanged over the years.

That might seem odd, compared to the rate of change in other areas, but it’s because these techniques rely on exploiting fundamental quirks of human nature – quirks that allow hackers to manipulate us for their own ends. But what buttons do these attack methods push in our heads and is there any way for us to fight back? In this episode, we talk to Stephen Burke, CEO and founder of Cyber Risk Aware, to learn more.

In the news this week, we discuss Minecraft’s migration to Azure, Salesforce silencing Einstein, and the government accidentally breaking data protection rules with its Track and Trace programme.

Footnotes

News

In-depth

Subscribe

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

AOL users are the target of a new phishing campaign
phishing

AOL users are the target of a new phishing campaign

1 Mar 2021
Lazarus APT hacking group is targeting the defense industry
Security

Lazarus APT hacking group is targeting the defense industry

26 Feb 2021
FedEx and DHL phishing emails target Microsoft users
phishing

FedEx and DHL phishing emails target Microsoft users

24 Feb 2021
Hackers are using Google Alerts to help spread malware
hacking

Hackers are using Google Alerts to help spread malware

22 Feb 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021