• About Us
  • Contact
  • Careers
  • Send Us a Tip
Menu
  • About Us
  • Contact
  • Careers
  • Send Us a Tip
CyberNews logo
Newsletter
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
Menu
  • Home
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
CyberNews logo

Home » Security » Why IT systems are most at risk after the holidays

Why IT systems are most at risk after the holidays

by Adi Gaskell
21 January 2020
in Security
0
system hacked
0
SHARES

The first week after the holidays was awash with ‘back to work’ memes as people voiced their struggle at venturing back into the office after a period of excess over Christmas and the New Year. Social media has been flooded with gifs and other images illustrating the ‘joy’ people felt about being back, but our struggles have a clear scientific basis to them, whether in terms of the lack of daylight those of us in the northern hemisphere are experiencing, the relatively long period until the next holiday, and even withdrawal from alcohol and other holiday staples that people decide to abstain from in January as part of new year health drives.

It’s easy to treat such scenarios in a light-hearted way, but research from the University of Delaware highlights how they could have very real implications for the cybersecurity of our organizations. The findings center on the impact our generally low mood has on our willpower and self-control, with the researchers hypothesizing that the lower our willpower, the more prone we are to engage in behaviors that place us at risk of hacking.

In most organizations, there are clear policies to help guide workers in the right direction, whether it’s setting robust passwords, installing unapproved software or accessing dubious websites. The problem is, when we’re not at our best, we’re more likely to violate those policies.

Risky behavior

The study focused primarily on the kind of insider security breaches that are such a common form of problems in our organization, with many of these breaches resulting from noncompliant behavior from employees. If we’re tired, generally a bit grumpy, we tend to be less disciplined in a variety of ways, and the diligence with which we adhere to our employer’s security protocols is no different.

So what can you do about it? A recent study helpfully highlighted how good cross-country skiers were at overcoming the generally miserable post-Christmas mood, but on the off chance that you don’t have access to snow, there are thankfully a range of things you can do to boost your self-control, and subsequently remain secure as you go about your work.

  • Be in control – A good first step is to believe we are largely in control of our destiny. Gene Hayman famously argued that a starting point for many of our addictions is a lack of belief in our own agency. A sense of control, therefore, is often a good starting point for a range of constructive behaviors.
  • Set some goals – I know, I know. January is lethal for new years resolutions that seldom make it past the end of the month, so setting goals must be a waste of time, right? Yes and no. Goals inevitably help to guide our choices, and work especially well when they’re specific rather than abstract. Many workplaces now gamify this process as part of wellbeing initiatives, so consider doing likewise for cybersecurity.
  • Get feedback – Another central concept of a gamified approach is to get feedback on your progress. The ability to self-monitor our progress towards the goals established previously is crucial to maintaining the right behaviors.
  • State the importance – It’s tough to adhere to policies if you don’t appreciate their importance. Cybersecurity may be obvious in areas such as healthcare, but even there, breaches are commonplace, so it’s vital that employees appreciate how their actions really matter.
  • Give support – It seems unlikely that any individual will engage in unsafe behavior willingly, so it’s important that any attempts to ensure people adhere to policies is accompanied by support so that they have confidence in their ability to do so, even if their willpower is low.
  • Reduce stress – Self-control is largely a matter of energy, and there are numerous things in our working life that diminish our energy levels, whether that’s our commute, our workload, our colleagues or our boss. If you can help reduce stress as much as possible, it will help employees do the right thing in terms of cybersecurity.
  • Build resilience – This goes hand in hand with the aforementioned notion of reducing our stress, as there are various things we can do to better buffer the stresses we do face, from getting more exercise, more exposure to nature and daylight or utilizing meditation and mindfulness.

Research has shown that initial cyber breaches are often followed rapidly by a second, so it’s best to try and ensure no such breaches occur in the first place. The post-holiday blues provide a fertile ground for breaches to occur, so it’s vital that employers take steps to help employees act in the right way. Hopefully the above tips will help ensure that happens and your organization doesn’t suffer any cybersecurity issues this winter (or what’s left of it).

ShareTweetShareShare

Related Posts

TikTok logo

Potentially massive TikTok vulnerability patched

28 January 2021
The satellite-hacker’s guide to the space industry: don’t panic (yet)

The satellite-hacker’s guide to the space industry: don’t panic (yet)

27 January 2021
Man in front of multiple computers

North Korea has been targeting threat researchers

27 January 2021
Teespring data leaked on hacker forum

8+ million Teespring user records leaked on hacker forum

25 January 2021
Next Post
cybersecurity and prevention

3 myths around cybersecurity that prevent organizations from being safe

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Popular News

  • 70TB of Parler users’ messages, videos, and posts leaked by security researchers

    70TB of Parler users’ messages, videos, and posts leaked by security researchers

    83059 shares
    Share 83049 Tweet 0
  • 8 best cybersecurity podcasts for 2021

    56 shares
    Share 56 Tweet 0
  • Walmart-exclusive router and others sold on Amazon & eBay contain hidden backdoors to control devices

    13365 shares
    Share 13361 Tweet 0
  • The ultimate guide to safe and anonymous online payment methods in 2021

    13 shares
    Share 13 Tweet 0
  • Network Attached Storage

    0 shares
    Share 0 Tweet 0
Is PayPal’s crypto move a game-changer for bitcoin?

Cryptocurrency crime drops in 2020 but ‘DeFi’ breaches rise, study finds

28 January 2021
Privacy is an illusion. But that‘s a good thing

Privacy is an illusion. But that‘s a good thing

28 January 2021
Will quantum cryptography break classical encryption?

Will quantum cryptography break classical encryption?

28 January 2021
TikTok logo

Potentially massive TikTok vulnerability patched

28 January 2021
The U.S. flag is seen on a building on Wall St.

Costly short squeeze makes Reddit required reading on Wall Street

28 January 2021
Huawei logo display

White House vows to protect U.S. telecoms network from Huawei security threat

28 January 2021
Newsletter

Subscribe for security tips and CyberNews updates.

Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!
Categories
  • News
  • Editorial
  • Security
  • Privacy
  • Resources
  • VPNs
  • Password Managers
  • Secure Email Providers
  • Antivirus Software Reviews
Tools
  • Personal data leak checker
  • Strong password generator
About Us

We aim to provide you with the latest tech news, product reviews, and analysis that should guide you through the ever-expanding land of technology.

Careers

We are hiring.

  • About Us
  • Contact
  • Send Us a Tip
  • Privacy Policy
  • Terms & Conditions
  • Vulnerability Disclosure

© 2021 CyberNews

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy.

Home

News

Editorial

Security

Privacy

Resources

  • About Us
  • Contact
  • Careers
  • Send Us a Tip

© 2020 CyberNews – Latest tech news, product reviews, and analyses.

Subscribe for Security Tips and CyberNews Updates
Email address is required. Provided email address is not valid. You have been successfully subscribed to our newsletter!