Verizon’s 2021 data breach report shows phishing is responsible for the vast majority of breaches. Business Email Compromises were the second most common form of social engineering. Hackers tap into human cognitive biases to sway users’ decisions based on irrelevant or misleading information.Download this guide to better understand what makes users click when they shouldn’t and what makes them click. The Nudge theory is used in cybersecurity to combat behavioral biases. It is also used in the Nudge Theory and how it”Six steps for a cyber immune culture.
Source: https://www.helpnetsecurity.com/2021/06/01/mitigating-the-human-risk-factor/

