Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalSecurity Talk ColumnLogical SecurityAccess ManagementPhysical Security

How Different Personality Types Affect Cybercrime

By Diane Ritchey
SEC0919-talk-Feat-slide1_900px
SEC0919-talk-slide2_900px
SEC0919-talk-Feat-slide1_900px
SEC0919-talk-slide2_900px
September 2, 2019

Time after time, we have seen that the next "Big Thing" in cybercrime goes live before we have even started getting to grips with the last "Big Thing."

That's why new research is suggesting a different method to mitigate cyberattacks: your personality.

According to a report, Cyberchology: The Human Factor, from ESET and The Myers-Briggs Company, organizations engaging in the war against cybersecurity breaches can use cyberchology, which is a method of applying psychometric tests.

What is notable about the most successful cyberattacks, says the report, is that they rely on a degree of human error and/or ignorance. For example, cybercriminals are able to install phishing codes onto systems via Alexa because many people are unaware of the need to protect their smart devices as well as their desktop computers. In a business context, there is often a lack of awareness about the need for a truly integrative and self-aware approach to cybersecurity, which is one that encompasses everyone and not just the folks in the IT department, the report notes.

In addition, many people still have an old-fashioned view of cybercrime as something done for fun by malcontents. According to this mindset, the unwary may end up with a file-garbling virus.

The report found that as far as cybersecurity is concerned, different personality types have different strengths and weakness.

The report looked at several personality types to show how different kinds of cybersecurity errors are more common among people with certain personality preferences.

Extraverted personality types, those that work out ideas by talking them through, tend to be more vulnerable to manipulation, deceit and persuasion from cybercriminals. These kinds of attacks are social engineering attacks, and they’re particularly effective against Extraverted types who may be more susceptible to social overtures. However, being highly tuned towards external communication does work in Extraverts’ favor in other situations: Extraverted people are generally faster to pick up on attacks coming in from outside.

Sensing personality types, those that observe and remember details, are more likely to spot phishing attacks than their Intuitive counterparts. However, those that have the preference for Sensing are also more likely to take cybersecurity risks, particularly when they also have a preference for Perceiving, those that are more flexible and casual, and/or Extraverted (those who are sociable and are expressive).

Feeling personality types, those guided by personal value, and people with a preference for Judging, those who are systematic or structured, are more likely to fall victim to social engineering attacks than those with a preference for Thinking (those who solve problems with logic). However, people who have the preference for Thinking can overestimate their own competence, leading to mistakes, whereas Judgers and Feelers tend to be more cautious and therefore more rigorous when following cybersecurity policies.

So, all personality types have different strengths and blind spots that can impact the outcome of a cybersecurity attack. Identifying where these lie and how they might correspond to your cybersecurity protocols could be a first step in building a coherent, integrative cybersecurity program. For example, people with a reference for Intuition (the opposite to Sensing) will really benefit from being reminded to look at the detail of emails – does the sender’s email address look odd, for example?

Those with a Thinking preference can be encouraged to see a correct approach to cybersecurity as an expression of their own competence. Building an individual’s self-awareness will help them to take responsibility for their own cybersecurity. Overlaying organization-wide self-awareness with a robust cybersecurity system can create a net of human/digital skills and proclivities that cybercriminals will have trouble slipping through. The report suggests that psychometric tests can be used to build self-awareness, thereby reducing vulnerability to cybersecurity breaches.

Overall, says the report, cybersecurity is something that too many businesses leave up to dedicated IT specialists, when in fact, a lot of breaches could be avoided if a more integrative and business-wide approach to cybersecurity were adopted, which includes taking into consideration the human factor.

Are you studying employee personalities in your enterprise to mitigate cyber risks? I’d like to know. Email me at ritcheyd@bnpmedia.com

KEYWORDS: cybercrime cybersecurity Information Technology Security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0519-talk-Feat-slide1_900px

    How to Keep Your Top Performers from Leaving

    See More
  • SEC0620-cover-Feat-slide1_900px

    How COVID-19 has Transformed InfoSec

    See More
  • Differences between a white hacker, blue hacker and black hacker

    Hats of Many Colors: How Ethical Hackers Could Benefit Your Enterprise

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing