{
  "type": "bundle",
  "id": "bundle--42df6729-b88e-4575-ad4f-6b927571dd99",
  "objects": [
    {
      "type": "identity",
      "spec_version": "2.1",
      "id": "identity--caff07ed-ffad-5779-8b18-8d92dfadc2cc",
      "created": "2024-01-01T00:00:00Z",
      "modified": "2024-01-01T00:00:00Z",
      "name": "Marisec Intelligence",
      "identity_class": "organization",
      "description": "Clarity in a Complex Threat Landscape"
    },
    {
      "type": "report",
      "spec_version": "2.1",
      "id": "report--e2a02bfc-daae-5f42-abb2-ff3540ecc9ba",
      "created": "2026-03-23T18:04:17.000Z",
      "modified": "2026-03-23T18:04:17.000Z",
      "created_by_ref": "identity--caff07ed-ffad-5779-8b18-8d92dfadc2cc",
      "name": "Why Your Brain is a Cyber Security Risk",
      "description": "Human thought is still evolving to handle the digital world. We act instinctively when we should act deliberately \u2014 and under pressure, we rarely consider all the options available to us. This article examines how we think under stress and outlines practical steps organizations can take to protect themselves",
      "published": "2026-03-23T00:00:00.000Z",
      "report_types": [
        "threat-report"
      ],
      "labels": [],
      "object_refs": [
        "identity--caff07ed-ffad-5779-8b18-8d92dfadc2cc"
      ],
      "x_marisec_category": "Article",
      "x_marisec_sectors": [],
      "x_marisec_ai_disclosure": "partial",
      "x_marisec_author": "Marisec Intelligence Team",
      "x_marisec_slug": "why-your-brain-is-a-cyber-security-risk",
      "x_marisec_content": "<p>Humans are not wired for the digital world.&nbsp; We respond to threats the same way we did when predators were chasing us \u2013 because we are wired for survival. &nbsp;Our landscape has changed, but our instincts have not. Today, the predator is more likely to be a carefully crafted email than anything in the physical world.</p><p>Consider a scenario where you receive a password reset email for your favourite social media account. It would be natural to feel a sense of panic \u2013 you need to react; someone may have your personal account.</p><p>In psychology, cognitive narrowing refers to the way stressful situations narrow the options we consider. We gravitate towards familiar, immediate choices, not necessarily the ones that serve us best.</p><p>You may not consider looking at the email headers while you are out with your friends. In fact, you may not even consider whether the email is legitimate at all. &nbsp;Instead, you will deal with the threat in the best way that you can \u2013 by resetting your password.</p><p>Threat actors know that pressure tactics work well. These tactics exploit human emotions that we are all susceptible to. For the password reset email, you may decide to act quickly and select a new password. &nbsp;Under stress, the password is likely something you have used before. By clicking the password reset link, you walk into a trap without knowing or considering it was one \u2013 a convincing password reset page on a phishing site.</p><p>Password reuse is partially explained by a concept known as familiarity bias.&nbsp; We prefer options that feel known and tested \u2013 selecting a familiar password carries far less mental load than creating a new one.</p><p>Email is one of the most targeted vectors for these attacks \u2014 and the numbers explain why. Research by Mailjet found that 55.2% of email users check their email first thing in the morning between 9 -11 AM. Another study by market.us indicates that 88% of users check their inbox several times each day. Email is a medium with usage that increases year over year.</p><p>As security practitioners, we encourage our employees to practice good password hygiene, but we often do not provide them with tools to do so.&nbsp; Many smaller organizations do not use a company-sanctioned key vault, and multi-factor authentication may not be deployed for VPN connections and applications. In many cases, security awareness training does not happen frequently enough to change behaviour. &nbsp;In our password reset example, a company could become fully compromised if the employee reused a password associated with a corporate account.</p><p>Most threat-actors are financially motivated. Ransomware groups will use stolen credentials to steal and encrypt data, while others may attempt to social-engineer finance departments into redirecting payments.</p><p>The scenario described above is not an edge case \u2013 it plays out across organizations daily. Administrators are fighting against human nature. So, what\u2019s the solution?</p><ul><li><p><strong>Configure VPN connections to use multi-factor authentication and certificates</strong>: Certificates reduce the likelihood of successful MFA fatigue-type attacks (users are repeatedly prompted to accept MFA requests).</p></li><li><p><strong>Implement a corporate key vault: </strong>A corporate key vault removes the burden of password memorization, making unique credentials practical for every account.</p></li><li><p><strong>Disable password expiry:</strong> NIST SP 800-63B states that organizations should stop enforcing mandatory periodic password changes.&nbsp; While the recommendation may seem counterintuitive, users may choose simpler passwords when under time pressure.</p></li><li><p><strong>Implement passkey logins:</strong> Passkeys remove human decision-making from the authentication process, eliminating the shared credentials and phishing risks that come with it.</p></li><li><p><strong>Security Awareness Training:</strong> Behaviour change requires reinforcement. &nbsp;Training should be conducted monthly.&nbsp; Consider adding variety by changing the theme. One month could be phishing, another month could be social engineering awareness, etc.</p></li><li><p><strong>Dark-web monitoring:</strong>&nbsp; Organizations should know when corporate credentials appear on the dark web. Early detection enables a timely response \u2014 reducing the window of opportunity for threat actors to weaponize stolen credentials.</p></li></ul>"
    }
  ]
}