Cybersecurity Threats Your Introverted Employees Tend To Attract Based On Their MBTI!

by BGC Candidates

Est. Read time:




Copy Of Gabriel's Bgc Blog Banners   2020 03 20 T181116

Can your personality type make you more susceptible to different cybersecurity attacks? A 2019 study has revealed the link between ones MBTI (Myers-Briggs Type Indicator) personality type and the vulnerability to different types of cybercrime.

The MBTI personality type assessment aims to assess people according to four preferences:

  • Extraversion/Introversion: This shows where the individual gains their energy. Extraversion (E) refers to social interaction whilst Introversion (I) refers to alone time.

  • Sensing/Intuition: This is indicative of how the individual learns. Sensors (S) prefer logic and hard facts. Whilst Intuitors (N) has a preference for gut feel and abstract concepts.

  • Thinking/Feeling: Simply put, this shows how an individual makes decisions. Thinkers (T) make decisions based on logic and facts. Feelers (F) on the other hand, decide based on their emotions.

  • Judging/Perceiving: In the MBTI world, this refers to the individuals preference for either a more structured or open-ended lifestyle. Judgers (J) are more firm, direct and decisive. Perceivers (P) are often more adaptable with better listening skills.

Keep in mind, that despite these differences, all personality types are likely to fall for cyber threats when theyre uneducated. When it comes to risks, anyone unacquainted with proper cybersecurity hygiene is at risk of a data breach. Curious to find out more?

Here are the different types of cybersecurity threats your employees will fall for based on their MBTI type.



Introverted personality types can be broken down further into two different groups: Sensing and Intuitives. Unlike Extroverts, Introverts are not as quick to pick up on attacks coming in from outside. Sensors can be described as people more concerned about present-day details. To put it simply, Sensors are practical individuals. 


As an individual that leads by their F (Feeling) function, the ISFP is more likely to fall for social engineering attacks. However, as Sensors, these individuals are able to spot phishing attacks compared to their Intuitive (NF) colleagues.

Generally, once educated with the rules of cyber hygiene, the ISFP follows the IT security rules and policies closely.

Cybersecurity Tips for the ISFP

  • Think before clicking into that email or website 

  • Remember that people online have the potential to dupe you, regardless of how they might seem


The ISTP is someone that naturally has a mistrust of systems and of other people online. Unfortunately, as a Thinker, these individuals might over-estimate their own competence, which could lead to potential mistakes.

Cybersecurity Tips for the ISTP

  • Try not to bend rules. Instead, focus on the reasons for the rules in place.

  • Doing things on your own can be risky. 


These personality types are very likely to spot discrepancies and errors in phishing emails. Generally, these types follow IT security, rules, and policies. The only real problem with ISTJ employees is that they overestimate their own acumen. Which may lead to potential cyber breaches.

Cybersecurity Tips for the ISTJ 

  • Try not to reuse passwords or variations of the same passwords

  • You should try to rely on more than previous experience as a guide


Also known as the Defender, the ISFJ is a personality type that is meticulous when it comes to defending themselves against potential cybersecurity threats. Theyre more likely to spot discrepancies and errors when it comes to phishing emails. Additionally, these trustworthy employees dont fall for the same cybersecurity attack, twice. 

Cybersecurity Tips for the ISFJ

  • As a Feelingtype, you should be aware that online, people might not be who they are. 

  • Try to avoid using or trusting a public wifi when youre trying to send emails or messages with sensitive data. 



Intuitives on the other hand, are more likely to fall for a phishing email attack that plays on their emotions. Think a false charity email. Unlike sensors, these individuals generate ideas and possibilities based on the information theyve gathered. 


Fortunately, the INFP is an individual that is unlikely to make sudden or risky choices. One things for sure, this personality type is one that prefers to do things on their own terms and in their own way.

But as a nurturing type, the INFP can see the need to follow the rules of cybersecurity and cyber hygiene when theyre made aware of the effects of poor security on their colleagues and friends. 

Cybersecurity Tips for the INFP

  • Follow the IT security rules set by your organization. Dont try to bend or go against them. This helps you avoid harming the people that you care about.


The INTP is a personality that is often described as analytical and quiet. Which is why theyre pretty knowledgeable when it comes to cybersecurity-related issues. The INTP is also very aware of potential threats and cyberattacks. However, one major flaw to the INTP personality is that they tend to overestimate their intellect. This might lead to potential pitfalls and cyberattacks. 

Cybersecurity Ti