Basic cyber hygiene: Does it work?

JM Such, P Ciholas, A Rashid, J Vidler, T Seabrook - Computer, 2019 - ieeexplore.ieee.org
A number of security certifications for small-and medium-size enterprises have been
proposed, but how effective are these schemes? We evaluated the effectiveness of Cyber …

One size does not fit all: exploring the cybersecurity perspectives and engagement preferences of UK-Based small businesses

M Wilson, S McDonald - Information Security Journal: A Global …, 2025 - Taylor & Francis
This study examines the cybersecurity needs of UK-based Small and Medium-sized
Enterprises (SMEs) via thematic interviews grounded in the Health Belief Model with ten …

Pragmatic security: modelling it security management responsibilities for SME archetypes

S Parkin, A Fielder, A Ashby - Proceedings of the 8th ACM CCS …, 2016 - dl.acm.org
Here we model the indirect costs of deploying security controls in small-to-medium
enterprises (SMEs) to manage cyber threats. SMEs may not have the in-house skills and …

Evaluating the impact of government Cyber Security initiatives in the UK

AT Odebade, E Benkhelifa - arxiv preprint arxiv:2303.13943, 2023 - arxiv.org
Cyber security initiatives provide immense opportunities for governments to educate, train,
create awareness, and promote cyber hygiene among businesses and the general public …

A viewpoint on management practices for cybersecurity in industry 4.0 environment

NU Zia, VK Owusu - ECCWS 2020 20th European Conference on …, 2020 - books.google.com
Industry 4.0 is characterized by the smart business developments, application of cyber-
physical systems, internet of things (IOTs), excessive use of big data, etc. In other words, it is …

SME Cybersecurity Misconceptions: A Guide for Decision Makers

M Wilson, S McDonald - Cybersecurity for Decision Makers, 2023 - taylorfrancis.com
In this chapter, we explore small and medium-sized enterprises'(SMEs') attitudes to
cybersecurity adoption in the United Kingdom through a survey of 85 small businesses. The …

A Lot Less Likely Than I Thought: Introducing Evidence-Based Security Risk Assessment for Healthcare Software

C Weir, A Dyson, D Prince - 2023 IEEE Secure Development …, 2023 - ieeexplore.ieee.org
Security and privacy are particularly important for health applications and health-related
devices. So, it is vital that health software developers, especially in small to medium …

Work in Progress: Evaluation of Security Standards through a Cyber Range using Hackers' Tactics, Techniques and Procedures

P Wake, S Black, J Young - 2023 IEEE European Symposium …, 2023 - ieeexplore.ieee.org
We present a framework for the creation of a cyber range to test the effectiveness of security
standards, policies and frameworks. These assets guide organisations on how to protect …

Shellshock vulnerability exploitation and mitigation: a demonstration

R Shetty, KKR Choo, R Kaufman - … and Techniques in Cyber Security and …, 2018 - Springer
This paper presents a step-by-step demonstration for the exploitation of CVE-2014-6271,
affecting the 'Bourne Again Shell'(Bash). By design, Bash cannot be accessed via a web …

A System for Cost-Efficient Cybersecurity Planning, Compliance, and Investment Prioritization

B Shaqiri - 2023 - zora.uzh.ch
While the digital era provides many advantages, it also comes with significant risks related to
cybersecurity. Organizations must be proactive in reducing the risks involved with …