The IT Pro Podcast: The psychology of security

How hackers exploit our brains as well as our binary

Security is an unusual field; while it’s one of the fastest-moving areas of IT in some ways, in other aspects it hasn’t changed in decades. For example, phishing, business email compromise and physical infiltration tactics have remained largely unchanged over the years.

That might seem odd, compared to the rate of change in other areas, but it’s because these techniques rely on exploiting fundamental quirks of human nature – quirks that allow hackers to manipulate us for their own ends. But what buttons do these attack methods push in our heads and is there any way for us to fight back? In this episode, we talk to Stephen Burke, CEO and founder of Cyber Risk Aware, to learn more.

In the news this week, we discuss Minecraft’s migration to Azure, Salesforce silencing Einstein, and the government accidentally breaking data protection rules with its Track and Trace programme.

Footnotes

News

In-depth

Subscribe

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

What is hacktivism?
hacking

What is hacktivism?

13 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

6 Oct 2020
The Ritz suffers data breach after hackers pose as staff
data breaches

The Ritz suffers data breach after hackers pose as staff

17 Aug 2020
Russia hacked Liam Fox's personal email to steal trade documents
phishing

Russia hacked Liam Fox's personal email to steal trade documents

4 Aug 2020

Most Popular

Why you should prioritise privileged access management
Sponsored

Why you should prioritise privileged access management

9 Oct 2020
IT services giant Sopra Steria falls victim to Ryuk ransomware
Security

IT services giant Sopra Steria falls victim to Ryuk ransomware

23 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020