top of page
  • Jessica Barker

Cyber Security Myths and Monsters

Cyber Security Awareness Month coincides with one of our favourite celebrations here at Cygenta, and that, of course, is Halloween. So, it’s only fitting that this month I have given a few awareness sessions for clients based on one of my most popular talks, Cyber Security Myths and Monsters.

What do myths and monsters have to do with cyber security? Well, in this talk I explain how cyber criminals are the vampires of cyber insecurity, exploiting others – draining their resources – as a means of building themselves up with money, information or status. The most recent version of the talk has been a great excuse for me to reference What We Do in the Shadows, those attackers that can seem pretty funny but we mustn’t forget, can cause real harm: AKA, the script-kiddies.

Among many other stories, I explain what Frankenstein can teach us about non-malicious insiders and how physical, digital and human security is the three-headed approach guarding the gates of cyber insecurity, much like Cerberus is the three-headed dog guarding the gates of hell. In this way, I cover the main threats in cyber security with classic movie monsters and myths, bringing the subject to life with stories that people really engage with. Humankind has always used stories as a way of understanding concepts that we want to better understand, and I think this is why Cyber Security Myths and Monsters works so well. Some of the stories I use are very well known (like Dracula), others not so much (people love learning about the myth surrounding the creation of the Giant’s Causeway and how I relate that to cyber war) but regardless of whether they come into the room knowing the stories or not, they leave with a fresh perspective on cyber security, told with a bit of humour, a bit of drama and a lot of great pictures.




Most of the talk is aimed at people who do not work in security, raising awareness of the threats and what we can do to better-protect ourselves. But I end by referencing two myths that give a special message for those of us working in security: Pygmalion and Golem (nope, not Gollum) and, more particularly, the Pygmalion effect and the Golem effect, which are psychological phenomenons, forms of self-fulfilling prophecies, that should inform how we communicate with others. The Pygmalion effect teaches us that if we speak respectfully to others, empower them and communicate high expectations, they will raise their behaviours to meet our expectations. The Golem effect is the corollary: if we speak poorly to others, undermine them and communicate low expectations, people will lower their behaviours to meet our expectations. There are lots of reasons why we should move away from the damaging narrative that people are the weakest link in cyber security and the Golem effect is possibly top of the list.

At Cygenta, one of our core aims is to de-mystify cyber security and make it less of a monster. This month alone, as part of our people-centric services, we will have spoken to over 5,000 people throughout the UK, Europe and the USA, doing what we can to support our clients delivering their Cyber Security Awareness Month projects. We hope CSAM has been as successful for you as it has been for us, and we wish you a happy Halloween!



61 views

3 Comments


Jeffrey Glenn
Jeffrey Glenn
Oct 19, 2023

I appreciate Henry for making me realise the truth to a certified hacker who knows a lot about what he is doing. I strongly recommend you hire him because he’s the best out there and always delivers. I have referred over 10 people to him and all had positive results. He can help you hack into any devices, social networks including – Facebook, Hangout, iMessages, Twitter accounts, Snap chat , Instagram, Whatsapp, wechat, text messages ,smartphone cloning,tracking emails and also any other social media messenger or sites. It’s advisable to hire a professional hacker.Thank me later. Contact him here., Henryclarkethicalhacker@gmail.com and you can text, call and Whatsapp him on +1(201)4305865, or +1(219)7960574.....



Like

Agnes Lizzy
Agnes Lizzy
Oct 14, 2023

Contact him for any type of hacking, he is a professional hacker that specializes in exposing cheating spouses, and every other hacking related issues. he is a cyber guru, he helps catch cheating spouses by hacking their communications like call, Facebook, text, emails, Skype, whats-app and many more. I have used this service before and he did a very good job, he gave me every proof I needed to know that my fiancee was cheating. You can contact him on his email to help you catch your cheating spouse, or for any other hacking related problems, like hacking websites, bank statement, grades and many more. he will definitely help you, he has helped a lot of people, contact him on,…

Like

Janet Lucy
Janet Lucy
Oct 12, 2023

I’m excited to write about Henry Hacker, he is a great and brilliant hacker who penetrated my spouse’s phone without a physical installation app. And I was able to access my spouse’s phone, SMS, Whatsapp, Instagram, Facebook, Wechat, Snapchat, Call Logs, Kik, Twitter and all social media. The most amazing thing there is that he restores all phone deleted text messages. And I also have access to everything including the phone gallery without touching the phone.I can see the whole secret of my spouse. Contact him for any hacking service. He is also a genius in repairing Credit Score, increasing school grade, Clear Criminal Record etc. His service is fast. Contact:, Henryclarkethicalhacker@gmail.com and you can text, call him on whatsapp…


Like
bottom of page