{"id":391,"date":"2025-04-28T12:01:49","date_gmt":"2025-04-28T12:01:49","guid":{"rendered":"https:\/\/cyberinnovations.co.uk\/ci\/?p=391"},"modified":"2025-06-13T12:43:03","modified_gmt":"2025-06-13T12:43:03","slug":"security-measures-dont-work-if-people-break-first","status":"publish","type":"post","link":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/2025\/04\/28\/security-measures-dont-work-if-people-break-first\/","title":{"rendered":"Security Measures Don\u2019t Work If People Break First"},"content":{"rendered":"<p>By Emily Rosenorn-Lanng<\/p>\n<p>You can have the strongest technical security controls in the world, but if your people are overwhelmed, foggy-headed, or burnt out, those controls are likely to fail. At Cyber Innovations Ltd., we have been exploring this dynamic using real-world data\u2014and one chart in particular captures it perfectly.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone  wp-image-392\" src=\"https:\/\/cyberinnovations.co.uk\/ci\/wp-content\/uploads\/2025\/04\/Stress-levels-v-cyber-security-controls.jpg\" alt=\"\" width=\"692\" height=\"478\" \/><\/p>\n<p>This visual shows a clear negative correlation between the percentage of enterprises adopting multiple ICT security measures and reported workplace stress levels across the EU (plus the UK). The data, drawn from CEOWORLD and Eurostat, highlights something deceptively simple yet profoundly important: more security does not always create more stress\u2014in fact, it may help reduce it.<\/p>\n<p>Now, this is correlation, not causation. But it suggests that workplace confidence in clear, effective security measures may ease psychological strain. And with AI-driven cyber threats accelerating, this balance matters more than ever.<\/p>\n<p><strong>The Hidden ROI of Lower Stress<\/strong><br \/>\nThere is a quiet but significant return on investment to be found here: lower stress levels lead to fewer errors, faster incident reporting, and a more engaged workforce. In cybersecurity terms, this directly strengthens both an organisation\u2019s risk posture and its operational resilience.<\/p>\n<p><strong>From Threat Indicators to Human Indicators<\/strong><br \/>\nIn cybersecurity, we are used to tracking technical Indicators of Compromise (IOCs).<\/p>\n<p>But we rarely ask: <strong>what are the human equivalents?<\/strong><\/p>\n<p>In high-stress environments, we start to see:<\/p>\n<ul>\n<li>Avoidance of incident reporting<\/li>\n<li>Decision fatigue and delays<\/li>\n<li>Overreaction or panic responses<\/li>\n<li>Shame, confusion, and fear of blame<\/li>\n<\/ul>\n<p>These are what we might call <strong>Indicators of Psychological Compromise<\/strong>.<\/p>\n<p>And crucially, they are not simply personal failings. They are structural. As Maslach and Leiter (1997) remind us, burnout does not arise from individual weakness\u2014it emerges when organisational demands chronically outstrip available psychological resources.<\/p>\n<p>Psychologically, this aligns with Professor Steve Peters\u2019 Chimp Paradox model. Under pressure, our rational brain (the &#8220;Human&#8221;) can be overridden by our emotional brain (the &#8220;Chimp&#8221;), resulting in impulsive, sometimes irrational behaviour. In cybersecurity incidents, this means that even well-trained individuals may bypass established protocols if stress levels are too high.<\/p>\n<p><strong>Human-Centred Cyber Response<\/strong><br \/>\nThis is precisely where Cyber First Aid (CFA) comes in. CFA reframes cyber incident response through both technical and psychological lenses. It focuses not only on compliance, but on readiness, recovery, and resilience.<\/p>\n<p>Structured around evidence-based tiers of response, CFA enables organisations to scale their support depending on the human stress indicators that emerge during and after cyber incidents. We are also currently developing a conceptual model that maps stress, security controls, and organisational outcomes in a clearer, actionable way (more on that soon).<\/p>\n<p>For now, I want to leave you with a simple provocation:<\/p>\n<p><em>What if security controls are not just about protecting systems \u2014 but about protecting people too?<\/em><\/p>\n<p><strong>Cyber First Aid is developed by Cyber Innovations Ltd..<\/strong><br \/>\nFor updates, resources, and future releases, visit our website or follow us on LinkedIn.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Emily Rosenorn-Lanng You can have the strongest technical security controls in the world, but if your people are overwhelmed, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":560,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[10],"tags":[],"class_list":["post-391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cfa"],"jetpack_featured_media_url":"https:\/\/cyberinnovations.co.uk\/ci\/wp-content\/uploads\/2025\/06\/Firefly_Start-your-journey-with-Cyber-First-Aid-today-or-explore-CyGamBIT-and-BU-CERT-to-dis-975964-scaled.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/posts\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/comments?post=391"}],"version-history":[{"count":2,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/posts\/391\/revisions"}],"predecessor-version":[{"id":576,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/posts\/391\/revisions\/576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/media\/560"}],"wp:attachment":[{"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/media?parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/categories?post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberinnovations.co.uk\/ci\/index.php\/wp-json\/wp\/v2\/tags?post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}