The IT Pro Podcast: The psychology of security

How hackers exploit our brains as well as our binary

Security is an unusual field; while it’s one of the fastest-moving areas of IT in some ways, in other aspects it hasn’t changed in decades. For example, phishing, business email compromise and physical infiltration tactics have remained largely unchanged over the years.

That might seem odd, compared to the rate of change in other areas, but it’s because these techniques rely on exploiting fundamental quirks of human nature – quirks that allow hackers to manipulate us for their own ends. But what buttons do these attack methods push in our heads and is there any way for us to fight back? In this episode, we talk to Stephen Burke, CEO and founder of Cyber Risk Aware, to learn more.

In the news this week, we discuss Minecraft’s migration to Azure, Salesforce silencing Einstein, and the government accidentally breaking data protection rules with its Track and Trace programme.

Footnotes

News

In-depth

Subscribe

Featured Resources

B2B under quarantine

Key B2C e-commerce features B2B need to adopt to survive

Download now

The top three IT pains of the new reality and how to solve them

Driving more resiliency with unified operations and service management

Download now

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently

Download now

How fashion retailers are redesigning their digital future

Fashion retail guide

Download now

Recommended

Most employees put their workplace at risk by taking cyber security shortcuts
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

27 Jul 2021
61% of organizations say improving security a top priority for 2021
cyber security

61% of organizations say improving security a top priority for 2021

29 Jun 2021
ProtectedBy.AI’s CodeLock blocks malware at source code level
software as a service (SaaS)

ProtectedBy.AI’s CodeLock blocks malware at source code level

9 Jun 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021

Most Popular

The benefits of workload optimisation
Sponsored

The benefits of workload optimisation

16 Jul 2021
Samsung Galaxy S21 5G review: A rose-tinted experience
Mobile Phones

Samsung Galaxy S21 5G review: A rose-tinted experience

14 Jul 2021
Six ways boards can step up support for cyber security
Business strategy

Six ways boards can step up support for cyber security

22 Jul 2021