Friday, July 1, 2022
Techiexpert.com
No Result
View All Result
  • Login
  • Register
Exclusive Videos
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media
No Result
View All Result
TechiExpert
No Result
View All Result

Changing Bad Online security Habits with Behavioral Change

Devin Smith by Devin Smith
May 10, 2022
in Tech news
Reading Time: 3 mins read
Changing Bad Online security Habits with Behavioral Change 1
9
SHARES
126
VIEWS
Share on FacebookShare on Twitter

With lives becoming smart, more and more users and organizations have gone online, which led to a mass scale increase in cyber attacks. Cyber attacks have been estimated to rise by 67% in the past five years course, and the one major cause of the breach has been due to “human error.”

The estimation speaks a lot regarding the attacks scope and the impact it makes on the organization level and on the individuals. Which is why protecting oneself against these cyber attacks is not only complicated but a lengthy procedure as well. The fundamental issue arises because the technology we use nowadays has become sophisticated, but the attackers have found ways to deal with complex securities.

Then again, staying updated with the latest safety measures and considering safer devices is not the best possible solution. Users are frustrated, looking at the constant data breaches hitting the headlines “called privacy fatigue.” After some time, users get tired of updating privacy settings, changing passwords, and installing new software just for fear of cyber attacks.

Effects on Individuals and Organizations

Looking to outrun an organization’s breach, the most common way is providing employees and other concerned individuals particular training sessions. But the problem with such training is, it becomes obsolete within a short span and most of the employees get busy with their daily tasks. While employees are concerned about their tasks, they forget to stay updated and secure which makes balancing job and safety chaotic.

Research stated users logged out of the machine when they moved away from it. This happened when computers were fitted with proximity sensors. As a solution, users started placing cups on the sensors to disable it.

The aim was to improve the security benchmark but when the process initiated, it became an extra responsibility on the user. Considering that is the case then users had to continuously log in every time they went far away from their devices. These constraints encouraged cyber threats which took advantage of the scenario. A phishing email is a common problem that is time bound.

When people are busy in their routines, not being targeted is difficult but not impossible. It could be solved by changing their own “predetermined responses” which are habits or actions taken without careful consideration and are promoted as unintentional.

If all the users are trained in this way, the possibility of cyber attacks can be decreased. A “People’s Habit Research” indicated that prominent events or physical objects can trigger certain behaviors. Multiple gadgets fall under similar triggering factors.

There are certain things that users do which trigger cybersecurity behavior. These triggers are mostly interrupted when users do tasks that are not meant to be done. A good example would be when a person is scrolling on the web, and unwanted pop-up message appears. The notification can be very frustrating which users tend to ignore without reading as soon as possible to resume doing their tasks.

Changing Online Habits with Technology

There is a small electronic device called Adafruit Circuit Playground that is a programmable device which displays multiple colored lights that project rays of different patterns. This device needs to be kept close to a computer, and the sudden display of light will alarm the user to lock the computer display if somehow they left it open vulnerable.

The device can easily be installed and connected to multiple sensors that work to detect human movements triggering a beam of soft light (could be a sound as well) to aid the person change their old habit of leaving their computer screens open or updating privacy setting.

This kind of behavior (nudge) is less hectic for a person while he is working on a particular task, and without messing with the consistency of the user, the device will remind them. There is solid evidence of such actions which leave a positive impact on users.

When people are constantly distracted, lost in their conscious mind; they tend to oversee online privacy measures to stay anonymous and other vital considerations that lead to data breaches. These habits are present even after acknowledging the cyber threats and their seriousness. But specific behavior (nudging) can be a solution to reduce the chances of cyber threats making the workplace safe for everyone.

Tags: CyberAttacksCybersecurityonline privacy
Share4Tweet2Share1Pin1

Related Posts

Telemedicine Business
Tech news

Telemedicine or e-medicine: What is it?

Ways Data Analysis has changed customer reward programs
Tech news

Ways Data Analysis has changed customer reward programs

Digital Learning face recognition
Tech news

Here’s why Deep Learning might not be enough for celebrity face recognition

VPS Helps Forex Trading
Tech news

Staying Safe When Trading on a Trading App

Mozilla launches Thinderbird for android
Tech news

Mozilla launches Thinderbird for android

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Most Read

  • How to Track Someone’s iPhone by Phone Number?

    How to Track Someone’s iPhone by Phone Number?

    342 shares
    Share 137 Tweet 86
  • Top 5 car automation trends to know

    161 shares
    Share 64 Tweet 40
  • Is Parody Coin investment a Good Investment?

    67 shares
    Share 27 Tweet 17
  • What is windows modules installer ? How to Enable/Disable

    1236 shares
    Share 494 Tweet 309
  • Tips to Reduce Your Website Hosting Costs

    871 shares
    Share 348 Tweet 218
  • How to Track Activities an Instagram account?

    83 shares
    Share 33 Tweet 21

Recent Stories

Hyperlocal marketplace Urvann raises Rs. 3 Cr in Seed Round led by IPV

Hyperlocal marketplace Urvann raises Rs. 3 Cr in Seed Round led by IPV
Share4Tweet3Share1Pin1

Does domain extensions impact SEO standards

Does domain extension impact SEO standards
Share4Tweet3Share1Pin2

How Enterprise Blockchain can enable Privacy Preservation

How Enterprise Blockchain can enable Privacy Preservation
Share5Tweet3Share1Pin1

How to flip NFT’s

How to flip NFTs
Share4Tweet3Share1Pin1
  • Terms of use
  • Privacy Policy
  • About Us
  • Contact us
  • Write For Us
  • Cookie Policy

© 2022 All Rights Reserved

No Result
View All Result
  • Tech news
  • Startup news
  • Artificial Intelligence
  • IOT
  • Big Data
  • Cloud
  • Data Analytics
  • Machine Learning
  • Blockchain
  • Social Media

© 2022 All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Cookie Law Notice
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT