Skip to main content

We’ve all received the email. It appears to be from a colleague, and it asks us to click on a link within the email. We fall for it because it’s coming from someone you know, may have familiar content and some sense of urgency. But it’s a typical phishing email that cyber criminals use to gain access to a company’s information.

Stopping this kind of attack requires companies to understand behavioral economics and the nine cognitive biases used by hackers to dupe employees. With this understanding, companies can develop training and consistent communication that help employees recognize these phishing traps.

The FBI recorded over 23,000 complaints of Business Email Compromise in 2019, amounting to $1.7 billion in losses to organizations.
 

FBI Internet Crimes Report

This white paper examines:

  • The history and definition of cognitive bias

  • How to counteract cognitive bias 

  • Impactful employee training programs 

Learn more about how cognitive bias impacts cybersecurity by downloading “Cyber’s Human Condition: Understanding what makes us click and strategies for reducing preventable cyber breaches.”

Download the White Paper

More to Read

Expert Insights
Water Under the Breach: The Sunk Costs of Cyber Security

With the costs of cyber security on the rise and lack of visibility into the most productive cyber security controls, organizations are learning they need to better quantify and prioritize their investments to stay ahead of the game.

Recovery Insights
The Shift to Digital

The Covid-19 outbreak has accelerated the digitization of how we work, live and shop. Learn how businesses navigated the shift to digital, how consumers responded, and the spending trends likely to stay in a post-Covid-19 world.

Expert Insights
Optimizing Your Cyber Risk Strategy: Quantify, Prioritize, Protect

With cyber security threats becoming increasingly sophisticated, it’s imperative that organizations understand their vulnerabilities and invest in constantly improving their prevention and response strategies.