Hacker Public Radio

Your ideas, projects, opinions - podcasted.

New episodes Monday through Friday.


HPR4615: Clicking through an audit

Hosted by Lee on 2026-04-10 01:00:00
Download or Listen

This show has been flagged as Explicit by the host.

ISO 27001

from Wikipedia.org:

ISO/IEC 27001 is an information security standard . It specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system (ISMS). Organizations with an ISMS that meet the standard's requirements can choose to have it certified by an accredited certification body following successful completion of an audit .


Information security audit

from Wikipedia.org:

An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of information security, avoid improper information security designs, and optimize the efficiency of the security safeguards and security processes.


Factors contributing to cybersecurity fatigue

Source: Adapted from Factors contributing to cybersecurity fatigue by L. J. J. S. (2024), Abertay University.

Available at: https://rke.abertay.ac.uk/en/publications/factors-contributing-to-cybersecurity-fatigue/

In cloud-based environments, the push for high-security standards often leads to "cybersecurity fatigue," which creates unintended psychological strain on employees.

  • Constant interruptions from repetitive access requests.
  • Overload of security checks and decision fatigue.
  • Lack of clear understanding regarding actual cybersecurity risks.

Impact on Behavior

  • Fatigue frequently leads to negative outcomes, including the bypassing of security protocols, abandonment of necessary tasks, and total disengagement from mandatory training.

Key Concept

  • The study highlights "attitudinal fatigue" (an employee's negative mindset toward security) as a major barrier to organizational resilience and compliance.

Strategic Recommendations:

  • Transition to "contextualized training" that uses relatable, real-world scenarios.
  • Streamline security workflows to minimize disruption to daily productivity.
  • Develop targeted interventions.


National Institute of Standards and Technology

2011 Report: Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations


(Tangentially ) related Episodes


Provide feedback on this episode.

HPR Comments

Mastodon Comments



More Information...


Copyright Information

Unless otherwise stated, our shows are released under a Creative Commons Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0) license.

The HPR Website Design is released to the Public Domain.