Dr Patrick Scolyer-Gray 31 May. 2023
When human error accounts for up to 95% of data breaches, technology clearly isn’t the problem. We are.
In this episode of the Mastering Risk Management podcast our very own HCCS champion, Dr Patrick Scolyer-Gray, shines a light through the cracks in our digital defences and challenges listeners to think beyond the usual technological solutions when protecting one of their organisation’s most valuable assets.
Setting aside the hype and hysteria, watch our panellists as they interrogate AI’s implications for cyber threats and cybersecurity, focusing on providing practical strategies and tactics suitable for building cyber resilience.
Human-Centric Cybersecurity Champion, Dr Patrick Scolyer-Gray, shares his knowledge and experience on all aspects of cybersecurity.
The discussion so far has dovetailed into an argument for how techno-centric and HCCS can (and do) work together to resist and repel cybercrime, and although it is great to have a strategy for what we need to do, we need to remain cognisant of the sobering reality of our predicament: The ransomware crisis is far beyond the scope and capabilities of any single company or organisation.
In my last article, I made the argument that Human Centric Cybersecurity (HCCS) and conventional technical elements of cybersecurity need to work together as a unified front when combating ransomware. So, how does that work in practice when applied to combating ransomware?
Having recently covered the basics on ransomware and why it’s a clear and present danger, it’s time to look at the limitations of what has been the traditional approach used to try and resolve these issues.
Cybercrime has long been the stuff of the Internet’s collective cultural imagination; a well-worn stereotype of the hooded figure hunched over a keyboard. It might sound dramatic but make no mistake; ransomware attacks have grown in scale and frequency to a point where they now threaten the safety and wellbeing of all Australians.
Your organisation’s sensitive information is like the inside of an egg. To ensure their security against cyber attacks, most organisations today add layers of protection, constantly updating and investing in different methods to improve the protective properties of their ‘eggshell’. do you know how safe your egg is?