Ignoring the human element in cybersecurity protocols could potentially expose the business to cybercrime, according to ESET security company.
According to the cyber-science report, which examines the relationship between personality types and vulnerabilities to cybercrime, launched by ESET and The Myers-Briggs Company, only four in 10 (42%) companies focus on compliance training as part of their protocol for cybersecurity to ensure that sensitive data is retained.
More worrying is that ESET says that 63% rely mainly on passwords.
The cybersecurity document emphasizes that cybersecurity should be on the agenda of every boardroom. Management needs ongoing meetings and training to highlight and mitigate potential vulnerabilities in teams.
Jake Moore, security expert at ESE, says that using the deep scientific capabilities of ESET, the cyber security document highlights current cyber threats such as Formjacking, PowerShell and IoT attacks.
"Cyberattacks are almost considered business as usual because they have become so common," Moore says.
"The behavior of criminals is extremely diverse and unpredictable, and apart from a fair and reliable cyber solution, having a solid front line of employees who are armed with sufficient information and support is critical to the business," he explains.
Moore says securing the human element is vital in today's fast-changing cyber landscape.
"We see a growing need for companies to optimize cyber security protocols for their teams," he says.
Although the motivation for cyberattack may be diverse and impossible to predict, Moore says companies can take the time to learn more about the personality and preferences of their employees' behaviors to help them understand the role they play in the provision of company data.
A study conducted by Myers-Briggs, which looked at individuals across Europe, found that people who focus their attention on the outside world (Extraversion) are more vulnerable to manipulation and persuasion by cybercriminals.
In contrast, people who turn to sensitivity preferences (people who observe and memorize details) may be more appropriate to detect risks when they occur.
According to John Hackston, head of thought leadership at Myers-Briggs, he said that identifying people's potential strengths and weaknesses not only highlights how different team members can be put at risk without even knowing it, but it can also be used to encourage a dynamic collaboration team, as members can take advantage of strengths if there is something they are unsure about.
"With regard to cybersecurity protocols, we strongly recommend providing a personalized cyber security management program for employees," says Hxton.
"We believe that when employees are aware of their potential blind, they are naturally more invested and better prepared to pay attention to things that may not seem quite right," he explains.
"By improving employee self-awareness, employers can maximize individual and team effectiveness," Huckston adds. "This is especially important in a fast-paced industry like cybersecurity, which combines ever-changing challenges with the need to trust people."