Last updated: 30 July 2022

What is a VUCA world?

We now live and work in a world marked with Volatility, Uncertainty, Complexity and Ambiguity (VUCA). Bob Johansen, of the Institute for the Future, adapted VUCA for the business world in his 2009 book, Leaders Make the Future. He used it to reflect the turbulent and unpredictable forces of change that could affect organizations, and he argued that you need new skills, approaches and behaviors to manage in the face of the four VUCA threats.

The current VUCA landscape is quite volatile as the security challenges are blurring the lines between securing business and people’s way of life. A way of life that puts many organizations at risk for heightened cyber vulnerability. Understanding how human behavior, as a science increases the cyber surface attack in business, will also help business better understand how to empower their employees.

 

The rise of human manipulation through data

And cyber breaches are no exception, as they continue to make the headlines daily and disrupt business worldwide. Around 96% of cyber breaches are believed to be a result of social engineering. Social engineering is a technique to use emotions and manipulate someone to do something for you. When it is not in their best interest and thus categorized as emotional manipulation for malicious intent, that’s when business email compromise, phishing attacks and identity theft happens.

The current VUCA landscape is quite volatile as the security challenges are blurring the lines between securing business and people’s way of life. A way of life that puts many organizations at risk for heightened cyber vulnerability. Understanding how human behavior, as a science increases the cyber surface attack in business, will also help business better understand how to empower their employees.

Social engineering is a manipulation technique that exploits human error to gain private information, access, or valuables. In cybercrime, these “human hacking” scams tend to lure unsuspecting users into exposing data, spreading malware infections, or providing access to restricted systems. Attacks can happen online, in-person, and via other interactions. Scams based on social engineering are built around how people think and act. As such, social engineering attacks are especially useful for manipulating a user’s behavior. Once an attacker understands what motivates a user’s actions, they can deceive and manipulate the user effectively.

What is smishing and why it matters

According to Kaspersky:

Smishing is a phishing cybersecurity attack carried out over mobile text messaging, also known as SMS phishing. As a variant of phishing, victims are deceived into giving sensitive information to a disguised attacker. SMS phishing can be assisted by malware or fraud websites. It occurs on many mobile text messaging platforms, including non-SMS channels like data-based mobile messaging apps.

Mobile devices have become a fixture of every-day life for millions of people. Across the globe, web-enabled devices such as smartphones and tablets have evolved into essential tools for communication, information, and entertainment alike. In 2021, the number of unique mobile internet users stood at 4.32 billion, indicating that over 90 percent of the global internet population use a mobile device to go online. The human surface attack through mobile devices through smishing, which is a popular technique used by criminals to install malware, which ultimately can lead to ransomware attacks.

What you need to know in the current business landscape

Oscar O’Connor and I join David Reinstein and Henrik Nordmark to discuss cybersecurity, how companies can protect themselves online and how the rising tensions in Russia & Ukraine may mean in terms of cyber safety for businesses and individuals.

Check out the podcast episode brought to you by Profusion ⬇️

 

About the Cyber Eagles Podcast

The Cyber Eagles is a podcast for people-centric CISOs or digital leaders who are looking for practical ways to help their workforce see information security as a way of life instead of an additional workload burden. In each episode, cybersecurity industry veterans Oscar O’Connor and Nadja El Fertasi are having human, security-centric conversations with digital leaders about how they’ve successfully built cyber resilient cultures to absorb security risk and shift from chaos to order. You’ll get access to new, practical cyber hygiene habits and key takeaways to build a deepened understanding of cybersecurity resilience for your personal and organizational digital safety.

3 Different Ways I can help you

What if you could learn more without booking a discovery call with a stranger who, in your map of the world, is going to try to sell you something? Highly agree! That’s why I developed a virtual value proposition, explaining briefly in videos what problems I help my clients solve in three different ways.

  1. Access both virtual and in-person experimental learning trainings focused on building human resilience. Custom scenarios specific to your industry and sector.
  2. Need a little more help? My individual or group coaching plans can help you learn to lead your team through uncertain times and take them from chaos to clarity.
  3. My consultancy services in strategic stakeholder engagement and communication will help you drive employee resiliency as a transformational change program.

https://thrivewitheq.com/wp-content/uploads/2020/06/Thumbnails-300x169.png

I also believe in talking less and listening more, but your time is precious. Why would you give me your time if you don’t know if I would be able to help you. Hey, I don’t even know, as I am not every business’ cup of tea either. But what I do know is that if you sign up for my free resiliency course below, you will become clear quickly if you want to go to the next stage and see if we have business chemistry.

I invite you to click on my value proposition, explore my offerings and course, and decide whether you are ready for the Discovery Call step where we both decide if Thrive with EQ is the right fit.

 

×

Build a resilient employee experience, and start today!

× How can we help you?