Schedule a Zoom meeting to find out more about our programmes!

Human & Cybersecurity

Cybersecurity, particularly in the realm of social engineering has evolved significantly. Cyber attacks that target human vulnerabilities are often considered the easiest way to access both hardware and software in a target system. Humans, as integral components of cybernetic systems, interact with and control hardware and software, creating vulnerabilities. This human-machine interaction is pivotal, as it often represents the weakest link in a cybersecurity framework. This perspective can be examined from the viewpoints of cybernetics, human communication, the epistemology of New Code NLP, mindset profiling, cognitive biases, and persuasive languages.


Human-Machine Interaction: Cybernetics, the study of systems and control mechanisms in both machines and living things, emphasizes the interaction between humans and machines. In a cybernetic system, humans are integral components who interact with and control various aspects of the system, including hardware and software. This integration creates vulnerabilities, as the human component is often the weakest link in cybersecurity. A study by Verizon’s 2020 Data Breach Investigations Report found that over 80% of breaches within hacking involved brute force or the use of lost or stolen credentials, indicating human error or manipulation as a major factor.

System Vulnerability: Humans, unlike machines, are susceptible to manipulation, fatigue, and errors of judgment. This makes them vulnerable targets for social engineering attacks, where attackers exploit human psychology rather than technical hacking methods to gain access to systems.


Leveraging Communication for Manipulation: Social engineering attacks often exploit the nuances of human communication. For example, phishing emails mimic legitimate communication to deceive recipients into disclosing sensitive information. The 2019 Internet Crime Report from the FBI’s Internet Crime Complaint Center (IC3) revealed that phishing was the most common type of cybercrime.

Trust and Authority: Human communication often relies on trust and perceived authority. Attackers use this to their advantage by impersonating authority figures or trusted entities to extract information or gain access to systems.


Understanding and Influencing Perception: New code NLP focuses on how people perceive the world and how this perception can be influenced. It posits that individuals have subjective maps of the world, which can be manipulated. Cyber attackers use this principle to craft messages or scenarios that align with the victim’s world view, making the deceit more believable.

Behavioral Patterns: NLP also studies behavioral patterns. Attackers might use this knowledge to predict and exploit predictable responses in their targets, such as the tendency to comply with requests from authority figures or to click on links that appear relevant to their interests.


Targeted Attacks: Attackers often tailor their strategies by profiling the mindset of their targets. This involves understanding the target’s beliefs, values, fears, and desires. For instance, a 2018 study published in the Journal of Cybersecurity emphasized the importance of understanding the psychological traits of targets for effective spear-phishing.

Customized Deception: By profiling the target, attackers can create highly customized deception techniques. This personalization increases the likelihood of the target falling for the attack, as it resonates more with their individual experiences and beliefs.


Exploiting Biases: Cognitive biases like the confirmation bias, authority bias, and scarcity bias are often exploited in cyber attacks. For example, an attacker might pose as an authority figure (authority bias) or create a sense of urgency (scarcity bias) to compel the target to act without thorough scrutiny.

Manipulating Decision-Making: Understanding these biases allows attackers to manipulate the decision-making process of their targets. A study by the National Institute of Standards and Technology (NIST) highlighted how phishing attacks exploit cognitive biases to deceive users.


Milton Model Techniques: The Milton Model, a cornerstone of NLP, uses vague and metaphorical language to bypass the critical thinking faculties of the mind. This technique is powerful in cyber attacks, as it leads the target to fill in the gaps with their own interpretations and beliefs, making the deceptive message more personal and believable.

Subconscious Influence: By bypassing the critical filter, attackers can subtly influence the subconscious mind of their targets. This can make the targets more susceptible to suggestions and actions that they might otherwise scrutinize more carefully.

Human Vulnerability

The effectiveness of cyber attacks exploiting human vulnerability is significantly enhanced by profiling the mindset of targets, understanding and leveraging cognitive biases, and using persuasive language techniques like the Milton Model to bypass critical thinking. These strategies create a powerful combination that can deceive even the most vigilant individuals, underlining the importance of comprehensive cybersecurity training that addresses not only technical aspects but also psychological vulnerabilities.

1. People Cyber Screen

a joint service powered by  Sandline Risk Based Security , Mindsteep Consulting Training , Academia NLP & Coevolve

Human Vulnerability Assessment for Cybersecurity

People Cyber Screen is a service focused on enhancing organizational cybersecurity by assessing human vulnerabilities through neuro-linguistic patterns and mindset profiling. This approach integrates technical cybersecurity assessments with an analysis of individual mindset characteristics to fortify the organization’s cyber defenses.

2. Human Cyber Shield

a training research powered by  Sandline Risk Based Security , Mindsteep Consulting Training , Academia NLP & Coevolve

Personalized Cybersecurity Training for

Human Vulnerability

Following the detailed assessment provided by the People Cyber Screen, we are exploring and pioneering a personalized educational program, designed to fortify individuals against cyber threats. This program diverges from traditional awareness training by offering a customized, personalized “Human Cyber Shield” for each participant. Based on the unique vulnerabilities and strengths identified through the People Cyber Screen, the program tailors a set of cognitive tools, competences and behaviors aimed at enhancing an individual’s ability to recognize and block social engineering tactics, each trained person being capable to switch from empathic mode to a blocked human interface. This educational process is not static but a dynamic one, evolving strategy intended to adapt to the changing landscape of cyber threats and personal profiles.

Simplified Comparative Table

This table contrasts the traditional awareness training approach, focused on disseminating information, against the Human Cyber Shield concept, which represents a more holistic and multi-faceted strategy aimed at creating a sustainable cybersecurity culture through a variety of psychological and educational techniques.

Awareness Training

Increase knowledge of cybersecurity threats and practices.

Direct instruction via lectures, online courses, and informational materials.

Broad awareness of cybersecurity topics.

Informed workforce understanding cybersecurity basics.

Cognitive learning and information retention.

Passive (e.g., listening, reading).

Short-term without regular reinforcement.

Human Cyber Shield

Holistically enhance cybersecurity posture by modifying behaviors, conditioning responses, and aligning values and beliefs with secure practices.

Integrates multiple approaches including interactive methods, psychological conditioning, personalized coaching, and engagement with values and socio-cultural beliefs.

Comprehensive focus on changing habits, subconscious patterns, thought processes, and aligning cultural values with cybersecurity practices.

Enhanced security culture with deep-seated behavioral and value-driven changes towards cybersecurity.

Combination of behavioral modifications, psychological conditioning, cognitive restructuring, and value alignment.

Active and highly interactive, including experiential learning, personalized engagement, and deep value exploration.

Long-term, due to the comprehensive and integrated approach that affects subconscious, behavioral, and value-based layers of human cognition and action.

Human Cyber Shield stands as the sole accountable solution, transcending basic compliance training. It’s designed to fortify companies against cyber threats—87% of which exploit human vulnerabilities—ensuring robust defense. Moreover, it aligns with the essence of NIS Directive 2, offering an affective approach to long term sustainable cybersecurity.

Collaborative Research and Invitation

Understanding the evolving nature of cyber threats, we position both People Cyber Screen and the personalized educational program, Human Cyber Shield, as components of an ongoing research initiative. We invite experts, communities, and companies interested in advancing cybersecurity to join us in supporting, validating and testing these approaches. Our objective is to refine these tools through collaborative research, ensuring they remain effective against the spectrum of cyber threats. We encourage participation from cybersecurity experts, psychologists, educators, industry professionals, and the wider public. Through this collaborative effort, we can gather a wealth of insights and experiences that will enrich our understanding and enhance the effectiveness of our cybersecurity measures.

Schedule a Zoom meeting to find out more about People Cyber Screen and Human Cyber Shield!


Human Factor Focus: Delve beyond technical defenses to address the human elements of cybersecurity, reducing risks associated with human error.

Customized Approach: Personalized insights and strategies tailored to the unique psychological makeup of each team member.

Enhanced Cybersecurity Awareness: Cultivate a proactive cybersecurity culture within your organization through targeted training and awareness.

Comprehensive Assessment: From initial penetration testing to in-depth psychological profiling, get a complete overview of your team’s cybersecurity strengths and vulnerabilities.

Ethical and Compliant: Conducted with the utmost respect for privacy and ethical standards, ensuring compliance with data protection laws.


People Cyber Screen  and Human Cyber Shield aim to address the human aspect of cybersecurity by identifying and mitigating vulnerabilities through a multi-faceted approach. The service includes initial testing to establish a baseline of employee susceptibility to cyber threats, followed by in-depth psychological profiling and customized testing. The resulting data is used to generate individualized reports and strategic recommendations. The service is conducted in compliance with applicable privacy and data protection laws.


Penetration Testing: Executes initial and tailored simulated phishing tests to determine employee reactions to cyber threats.

Neuro-Linguistic and Mindset Profiling: Employs the MindSteep Community Mindset Questionnaire to evaluate individual neuro-linguistic patterns and mindset traits that impact cybersecurity behavior.

Individualized Reports: Delivers comprehensive reports for each assessed individual, outlining specific vulnerabilities, associated risks, and personalized improvement strategies.

Expert Interviews: Conducts interviews with mindset profiling specialists and licensed mental health counselors for individuals in high-risk or sensitive roles.

Strategic Recommendations: Provides customized recommendations and actionable strategies derived from the detailed assessment of individual and organizational cyber vulnerabilities.

Your innovative pathway to enhanced cybersecurity through human vulnerability assessment and training.


The primary goal of the service is to strengthen organizational cybersecurity by focusing on the human elements contributing to cyber vulnerabilities, particularly through the lens of neuro-linguistic patterns and mindset profiling.


People Cyber Screen and Human Cyber Shield are suitable for organizations aiming to enhance their cybersecurity measures by incorporating an understanding of the influence of neuro-linguistic patterns and mindset traits on cyber vulnerabilities.


1. Initial & Customized Penetration Tests: Simulated phishing emails from apparently trusted sources to assess baseline vulnerability and response to personalized threats.

2. Psychological Profiling via NLP: Utilize the MindSteep Community Mindset Questionnaire to evaluate individual psychological profiles, including attitudes, social values, and behavioral patterns in a cybersecurity context.

3. Tailored Vulnerability Reports: Receive detailed, personalized reports for each individual, outlining identified vulnerabilities, potential risks, and customized recommendations for training and improvement.

4. One-on-One Expert Interviews: Specialized sessions with professionals in mindset profiling and licensed mental health counselors for high-risk individuals or those in sensitive positions.

6. Actionable Strategies & Recommendations: Gain in-depth insights and practical strategies for enhancing your organization’s cybersecurity resilience at both individual and collective levels.


You can experience the capabilities of MindSteep People Cyber Screen firsthand. Click the button below to initiate a test of our service and discover how neuro-linguistic patterns and mindset profiling can enhance your organization’s cybersecurity resilience.

Schedule a Zoom meeting!


When you choose to assess the MindSteep People Cyber Screen, be assured that the security and confidentiality of your data are our top priorities. We adhere to stringent data protection protocols, ensuring full compliance with GDPR and other relevant privacy regulations.

Your organization’s information and the results of the service test will be handled with the utmost discretion. We are committed to maintaining the confidentiality of your data at every stage of the process, from initial assessment to final reporting.

Rest assured, your trust in us is backed by our commitment to safeguarding your data with the highest standards of security and privacy.


MindSteep People Cyber Screen service has undergone rigorous testing and validation. Our processes and assessments have been tested on over 10,000 individuals, ensuring a comprehensive and reliable approach to cybersecurity.

The effectiveness and accuracy of our service are backed by robust statistical measures. We have achieved an alpha reliability coefficient (α) greater than 0.8, demonstrating high internal consistency. Our Content Validity Ratio (CVR) exceeds 0.9, indicating that the test items are highly relevant and representative of the domain being measured. Additionally, the Standard Error of Measurement (SEm) is less than 3, ensuring precision and reliability in our assessments.

This extensive testing and validation underscore our commitment to providing a service that is not only innovative but also grounded in scientific rigor and reliability.

Schedule a Zoom meeting to find out more!

Time & COST

In considering the People Cyber Screen and  Human Cyber Shield, it is important to understand that both the temporal and financial aspects of the service are influenced by specific factors related to your organization’s needs.

Number of participants: The scope of the service – time and cost – is directly related to the number of individuals within your organization who will be participating in the scanning, profiling, and testing processes. A larger number of participants generally requires more time for comprehensive analysis and consequently affects the overall cost.

Depth of Analysis: The extent of the analysis you choose also plays a crucial role. A more in-depth analysis, which may involve detailed individual reports, extensive profiling, and one-on-one interviews, will require additional time and resources. This depth ensures a thorough understanding of your organization’s cybersecurity human factor but also influences the duration and cost of the service.

Our aim is to provide a tailored service that aligns with your specific requirements. We offer various packages and customization options to best suit the size of your team and the level of analysis desired. This approach ensures that you receive the most value and effectiveness from our service, in accordance with your organizational needs and budget constraints.

For a detailed estimate and to discuss how the People Cyber Screen and Human Cyber Shield can be adapted for your organization, please contact us. We are here to provide a solution that fits both your cybersecurity goals and your budget.

Schedule a Zoom meeting to find out how to become a stakeholder of People Cyber Screen & Human Cyber Shield.

Invest in People Cyber Screen
& Human Cyber Shield

 Transform your team from potential cybersecurity risks to informed, vigilant defenders against cyber threats. Empower your organization with a service that’s more than just a solution; it’s a proactive step towards a secure digital future. Get started  to build a more resilient, aware, and secure organization in the face of evolving cyber challenges.

”I invite you to test our Mindset Profiling app. part of PeopleCyberScreen service (version used for ANLP admission test). It's particularly relevant for recruitment, retention and cybersecurity. We can later discuss the results and their applications .”
Ovidiu Panea
Managing Director - MindSteep



After you understand the process clearly, before you start, set a context/situation and a goal/objective for why you are taking the MINDSTEEP PROFILING questionnaire.


Complete your identification information to be contacted for the interpretation of the profile.


Click the „OK. ÎNCEP PROFILAREA” button to generate the first page of the MINDSTEEP PROFILING questionnaire.


Hierarchy order ALL answers in terms of IMPORTANCE to you:

  1. Very important – POSITION 1, top.
  2. Important – POSITION 2.
  3. Neutral – POSITION 3.
  4. Little importance – POSITION 4.
  5. Very little importance – POSITION 5, bottom.

It is essential for the accuracy of the results to order ALL answers.


If you are using a mobile phone/tablet, tap and drag (drag & drop) each answer to the desired position. If you are working on a computer, use the mouse to grab and drag (drag & drop) EACH answer to the desired position.


When you are finished ordering, click the „OK. URMĂTOAREA!” button within the displayed time period (max. 45 sec.).


There are no right or wrong answers. Any way you order is fine, as long as this hierarchy truly represents you.


Completing the questionnaire takes between 30-40 minutes. Make sure you are not interrupted or disturbed when completing the questionnaire in order to stay on time.


First, read ALL the answers. Then, order ALL the answers.


Stay within 45 seconds per question.


The application will stop or cancel the questionnaire if you exceed the time limit or do not order all of the answers.


In case of cancellation, you can restart the questionnaire by completing all of the identification information again.


When you are finished, wait for the completion screen to open. Then, send us a message on WhatsApp to let us know that you have completed the test in order to schedule the interpretation or next action.


After successfully completing the questionnaire, the MINDSTEEP PROFILING application will begin the automatic process of analyzing the results and completing the individual mental profiling report.

When the report is finalized and verified, you will be informed by a message/email to schedule the online interpretation session.

In the event that you have been referred to this questionnaire institutionally, the relevant department will contact you for interpretation.

Support Line: +40.727744447

Access one of the MindSteep Profiling Apps.

Shopping Cart
Scroll to Top