top of page


When Busy Becomes Risky: Cognitive Overload and Everyday Data Incidents
Often it's not a lack of policy or training that causes a breach, it’s the quiet influence of a tired, overloaded mind. This morning I received a message on my phone that showed a colleague’s name. At first glance it looked perfectly normal, a friendly note asking for my number. Except he already had my number, and we had been messaging only a few days earlier. Before looking too closely, I sent him a quick message to check. Of course it wasn’t him. When I went back and exami
Laura Palmariello
Oct 30, 20255 min read
bottom of page