is a behavior, not a skill.
read more about These Cybersecurity behaviors .
Master the Nine Cybersecurity Habits to Protect Your Future
Key Strategies to safeguard your future .
Who is responsible for cybersecurity ?
The threat of cybercrime and the need for increased security is only occasionally discussed at board level in 54% of businesses.
65% of businesses say cybersecurity needs to be discussed more at senior management level.
31% of employees receive cyber training and education on an annual basis.
31% say the responsibility ultimately sits with the CEO
SOURCE: RSM GLOBAL KEY FINDINGS, 2019 CHUBB CYBER RISJ SURVEY
Security is about people, not technology
The Nine Cybersecurity Habits To Protect Your Future .
read more about These
Nine Cybersecurity Habits .
This latest book by George Finney offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. By implementing these habits and changing our behaviors, we can combat most security problems.
There is a way to improve human security. It starts with changing one habit at a time.
Security is in Your DNA .
As a social animal, we came together as a species for mutual protection, and we’ve evolved to have a natural desire to want to play a role in security. And whether we come together in our families, communities, or organizations, we need security in order to perform at our highest and reach our full potential as individuals.
As humans, we have the unique ability to understand how our own minds work, and then we can change our own minds from the outside in. We must understand not just the technical aspects of security but also the psychology and neuroscience behind it. Security is not a competency; it is a behavior. Behaviors can’t be changed overnight, but they can be changed.
be well aware tomorrow
WELL AWARE: MASTER THE NINE CYBERSECURITY HABITS
TO PROTECT YOUR FUTURE
Cybersecurity should be understood as a series of nine habits that can be mastered. Literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge George has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.
FREE DOWNLOAD .
Well Aware Companion Guide:
Roadmap to Success
Recent Articles .
In June 2017, I was in Vancouver, British Columbia, attending Palo Alto Networks’ annual cybersecurity conference, Ignite. Typically, the focus is on in-depth technical challenges
You should always expect to get a phishing message. Or at least that’s what we tell people. That is the solution to all our phishing