Security Rockstars
How we influence the human psyche for a successful ambassador network In today’s world of Security and Privacy, ambassadors can make the difference between a robust defense and a vulnerability that can be exploited. In our previously published blog “Shaping a Thorough Security and Privacy Ambassador Program – what’s really involved?” we dive into shaping […]
Shaping a thorough Security and Privacy Ambassador Program
What is really involved? As cyber threats evolve and data breaches make headlines, many organizations face a challenging mission: “How can we strengthen our information and privacy defenses and ensure that everyone in our organization is aware of the critical role they play?” Welcome to the world of information security ambassadors – the heroes who […]
Serious Games and Behavioral Change
Behavioral and cultural change are not only important aspects of information security and privacy … but also one of the most difficult. Everyone knows that change is not easy, whether at the individual level or at the corporate level. Just think, how long have you been saying you want to take 10,000 steps daily, […]
The NIS2 Guideline is coming
Network and Information System2 In an increasingly digitized world, businesses and organizations face increasing cyber security threats. For professionals in the field of Cyber Security, such as Brooklyn Partners, creating proper Cyber Awareness is critical. An important development affecting organizations in Europe in this area is the NIS2 directive. In this blog post, we will […]
The Fight Against Inertia: Digital Awareness and Cybersecurity
In the rapidly evolving world of digital technologies and the ever-growing threat of cyber attacks, cybersecurity awareness is critical. Yet there is one invisible enemy that can hinder progress in this area: inertia. In this blog, we explore the phenomenon of inertia in relation to digital awareness and cybersecurity, and discuss how organizations can overcome […]
Overcoming Resistance: Reactance
Overcoming Resistance: REACTANCE Resistance, a well-known phenomenon in human behavior, looms in various forms and situations. It occurs when we must face change, embrace new ideas or adapt to unfamiliar concepts. Three important aspects of resistance are reactance, skepticism and inertia . In this blog, we take a closer look at resistance Reactance. OVERCOMING RESISTANCE […]
Overcoming Resistance
The complex game of Reactance, Skepticism and Inertia Resistance, a well-known phenomenon in human behavior, looms in various forms and situations. It occurs when we must face change, embrace new ideas or adapt to unfamiliar concepts. Three important aspects of resistance are reactance, skepticism and inertia . Let’s take a closer look at these and […]
Overcoming Skepticism
Cyber security is critical in the modern world for organizations regardless of their size or industry. It protects sensitive information, ensures business continuity and prevents serious damage to reputation. However, despite growing awareness of the risks, many organizations still experience resistance in the form of skepticism to cyber security. Understanding and addressing this skepticism is […]
Court reports dissected: Information security in our municipalities.
Discover the most common IB&P weaknesses within Dutch municipalities. What are we paying attention to and what lessons do we learn from audit reports? It was an average work day for Pauline, the CISO of a medium-sized municipality, until an e-mail interrupted her pursuits: ‘Announcement of Court Study: Information Security and Privacy’. She set down […]
A business case for awareness
Well, how then? Many organizations struggle with building a business case for awareness in information security and privacy. Quantifying potential future risks still proves quite difficult in practice, and so figures have been guessed at for years. But as a CISO, FG or PO, being able to make an educated request for a new awareness […]
The Phishing Reporting Competition
The Phishing Test which is not about right or wrong, but about promoting safe behavior: recognizing and reporting phishing emails. Most Phishing tests only revolve around one thing, recognizing a phishing email and then whether or not you fall for it. It focuses primarily on right and wrong and is still too often used as […]
Interview with Queeny Rajkowski
Cyber Security, Awareness and its Future Thursday morning, Feb. 9, I, Koen van Nistelrooij, sat down with Queeny Rajkowski. Queeny Rajkowski has been Member of Parliament for the VVD since 2021 and spokesperson on digital economy and infrastructure, cybersecurity, cybercrime and digital democracy. Before that, she served on the city council in Utrecht for 7 […]
Awareness strategy
The traditional awareness strategy is a one-size-fits all nobody tragedy Amsterdam, Oct. 10 By Koen van Nistelrooij Often it goes something like this; “Oh guys, we have to do something with awareness.” A few fun activities are chosen, a few phishing tests rolled out, a few topics chosen with matching intranet articles and e-learnings then […]
Why the standard phishing test fails
‘UNFORTUNATELY, YOU HAVE FAILED’ Amsterdam, July 7 By Koen van Nistelrooij “Unfortunately, this was a phishing test and you fell for it (sucker)!Is what the majority of employees see after clicking on a phishing test link. The word “sucker,” of course, does not but that is how it often feels. Current phishing tests are blatantly […]
What is real and what is not … Will we soon be able to distinguish that with the rise of deepfake?
Recognizing and resisting deepfake Rutte calling for a meat tax or mouthing the word climate crisis at all. Or take the following sentence: “Corona was a toddler-sized crisis compared to what lies ahead for us due to climate change.” You can hardly imagine it and yet our prime minister says those exact words in this […]
What is IoT, and how do you handle it safely?
Securely handling Internet of Things, in an age of working from home Amsterdam, Jan. 18, 2022 By Max de Vries Working more from home means being even smarter with your devices. Something used by many people is Internet of Things (IoT). Sounds difficult, isn’t it; you use it yourself. All devices connected to the Internet […]
Tips for a digitally secure organization
In a digitally secure organization, employees are aware of their behavior. Read the tips here! A digitally secure organization in which employees are aware of their behavior. And where colleagues dare to voice their opinions, challenge and inspire each other to work more safely. This is what every CISO, PO and FG strives for. Logical, […]
Further than your nudge is long
Why nudging doesn’t work to clinch desired behavior Behavior does not change overnight. At least, if you want to bring about sustainable behavior change. There are numerous techniques and examples that seem effective in the short term by subconsciously influencing people. For example, look at nudging, where small adjustments are made to the choice architecture […]