Welcome to the blog

photo-1578264085899-43ae0b44649f

Make security feel good: hacking the brain's reward system

Did you know your brain is constantly on the hunt for rewards? It’s wired that way, thanks to your brain’s reward system – a natural mechanism that motivates us to repeat behaviors that feel good.

In the world of cybersecurity, this is a game-changer. When we understand how the brain’s reward system works, we can design security procedures that don’t just get followed but feel natural and even rewarding for employees.

The brain’s reward system – a quick intro

At its core, your brain’s reward …

Read more…

photo-1679639539537-0d2e452890f7

Train your brain for cyber secure habits

Did you know your brain is constantly rewiring itself?

Every time you learn something new or repeat a behavior, your brain changes its connections—a process called neuroplasticity.
This remarkable ability is why habits, both good and bad, are so hardwired into our lives. And it’s also the key to making cybersecurity second nature.

Neuroplasticity is your brain’s ability to adapt to new experiences. When you repeat an action—like locking your screen or spotting a phishing email—the neural pathwa…

Read more…

Elephant

Stop Writing Crisis Plans for People—Write Them for Elephants Instead!

When Crisis Strikes, Your Brain Isn’t Rational

Think you’ll stay calm, collected, and rational in the middle of an IT crisis? Think again. During a crisis, your brain is hijacked by stress hormones like cortisol and adrenaline. This triggers System 1 thinking, a term popularized by Daniel Kahneman, where decisions are fast, instinctual, and often shaped by cognitive biases.

In other words, the deliberate, logical mindset you used when writing your IT contingency plan disappears—and with it, your a…

Read more…

photo-1508004680771-708b02aabdc0

How framing bias shapes our cybersecurity decisions

Ever wondered why the way information is presented can change the way you feel about it?
That’s framing bias in action. Focusing on how options are presented—whether highlighting gains or emphasizing losses—can influence our choices without us even realizing it.

In cybersecurity, this bias plays a huge role.
Vendors often emphasize how their solutions help you avoid losses—like data breaches or reputational damage—because they know we’re wired to avoid risk at all costs.
Similarly, hackers are …

Read more…

photo-1633977264263-3514fb5ca1a2

Your Brain Was Built for Stone Age Risks—Not AI

Ever wonder why people are so skeptical about AI but seem perfectly comfortable with technologies we use every day, like smartphones or cloud services? It all comes down to the brain—and, spoiler alert, it's stuck in the Stone Age.

Our brains evolved to handle immediate, physical threats—think predators or hostile environments. Today, that same system, driven by the amygdala and limbic brain, reacts to new things, like AI, with fear and skepticism.

Studies show that when faced with something un…

Read more…

photo-1589994965851-a8f479c573a9

How Optimism Bias Can Blindside Your Cybersecurity Efforts

Ever feel like bad things only happen to other people?
That’s optimism bias at work—a cognitive bias that tricks our brains into believing we’re less likely to experience negative events than others.

In our  world of cybersecurity, this bias can cause serious blind spots. As security professionals we may underestimate the likelihood of a cyberattack or data breach happening to our organization, leaving us exposed to threats we aren’t prepared for.

 Let’s explore how optimism bias can affect our s…

Read more…

Billede 22.09.2024 kl. 10.27

Are you afraid of numbers?

Are you, like me, a little number-shy? Don’t worry, we all are.
Our brains simply aren’t built to grasp numbers, decimals, or probabilities naturally. We can recognize 1, 2, 3, 4, and 5, but after that, everything is translated by our subconscious into “many.”

For your subconscious mind, the difference between 1,000,000 and 1,000,000,000 is just “a lot” and “a lot more.” The large numbers are overwhelming, and the distinction becomes hard to comprehend.

But what if you explained the difference…

Read more…

identity-7785357_640

Unlocking the power of visual identity

Visual identity is more than just logos and color schemes—it’s a tool for shaping perception and trust.

In our field of IT security, where clear communication and trust are essential, creating a distinct visual identity for your department can play a vital role.
But what does this have to do with psychology and biases?

Our brains process visual cues much faster than text.

When people repeatedly see consistent visuals, they begin to associate those elements with specific qualities, like professi…

Read more…

progress-bar-156026_640

How feedback bias can turn simple nudges into stronger security habits

Have you ever noticed the colored bar when creating a new password?
It shows how well your password complies with the rules. The bar’s color shifts from bright red to green as you type, signaling your progress.
That small change can spark a sense of satisfaction, making the task of finding a cryptic, complex, yet memorable password feel less overwhelming.

This password strength indicator is a perfect example of feedback bias influencing secure behavior.

Feedback bias refers to the way people t…

Read more…

Decision fatigue

Decision fatigue can undermine your cybersecurity

We cybersecurity professionals know that we continously face a constant barrage of decisions: from triaging alerts to assessing risks.
But did you also know that the sheer volume of these decisions can lead to something called decision fatigue?

This phenomenon can subtly degrade your security posture even though it was thorough and well thought from the beginning.

Decision fatigue is the mental exhaustion that results from making too many decisions in a short period.
Already now my guess is th…

Read more…

Want to know more about how our subconscious brain affects us within cyber?
Subscribe to the newsletter to get blog posts and "Brainy fun facts" directly to your email.  

Let me have that newsletter!