The three constraints on Influence Operations - Digital Threat Digest
![Double circle designs part4](https://pgi.imgix.net/assets/uploads/images/Blog-posts/Double-circle-designs-part4.png?auto=compress%2Cformat&fit=crop&fm=webp&h=349&ixlib=php-3.1.0&upscale&w=349&tone=light)
Cyber security invasion is an ever-growing threat and should be a source of daily concern for all organisations. And yet, in spite of widespread publicity of the cost of spectacular attacks, many of the companies are not yet sufficiently prepared across their operations. The responsibility for cyber security is generally delegated to CIOs and CISOs, but ultimately falls on to the boards of directors.
This second edition of Managing Cybersecurity Risk focuses on the human factor training, cautionary tales of breaches that occurred through human error, while also identifying storytelling as an effective tool in cyber education.
In this book, CEO, Brian Lord shares his insight, challenges and advice based on his long experience within the cyber industry. Click the link below to download the full chapter, ‘If SMEs are the life blood of the British economy, we’ve cut an artery‘.
Since 2013, we have been helping organisations of all sizes manage their digital risk. Our team of digital threat experts bring a broad range of experience that will ensure you understand the specific threats to your organisation and how you can mitigate the risk. Talk to us about how we can help you.
As I waited for my flight to be rescheduled during last week’s IT outage, I listened to fellow passengers wonder aloud how a company whose name has never hit their radar could have such an impact on such a spectrum of day-to-day matters.
If you don’t know who Nara Smith is, I’m sorry to say you may just be living under a rock. Nara Smith has simply taken over my Instagram and TikTok feed with her ‘what I cooked for my husband today’, ‘what my toddlers ate today’ or my favourite video format, ‘my husband was craving [insert insane request] so I made it from scratch’.
Explaining how digital incidents severely impact the real world can be difficult, but we are increasingly seeing cyber incidents that illustrate how malicious actors can impact our daily lives.