Leveling and sharpening

Category:

What Should We Remember?

Definition:

The process where individuals simplify and highlight certain details when retelling an event, resulting in distorted memories.

Published on
September 4, 2024
Updated on
September 4, 2024
What Should We Remember?

Learning Objectives

What you will learn:
Understand the concept of the Leveling and sharpening
Recognize the Impact of the Leveling and sharpening in cybersecurity
Strategies to mitigate Leveling and sharpening

Other Cognitive Biases

Author

Joshua Crumbaugh
Joshua Crumbaugh
Social Engineer

Subscribe to our newsletter

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

The Psychology behind the Leveling and sharpening:

Leveling and sharpening, as a cognitive bias, illustrates the intricate mechanisms of memory reconstruction that occur during the recollection and retelling of experiences. Psychologically, this process is rooted in the brain's inherent desire for coherence and clarity. When individuals recount an event, they often condense the complexity of the experience by omitting less significant details (leveling) and accentuating those that seem more pertinent or emotionally charged (sharpening). This selective distortion not only simplifies the narrative but also enhances its emotional impact, making it more relatable and memorable.


The implications of leveling and sharpening extend beyond mere storytelling; they highlight a fundamental aspect of human cognition: the need to create narratives that align with one’s beliefs and feelings. This bias can lead to the embellishment of events, ultimately shaping personal and collective memories in ways that may not accurately reflect reality. In social contexts, these altered memories can influence group dynamics and perpetuate misconceptions, as individuals share their skewed versions of events, further propagating the distortions. Understanding this cognitive bias is essential for individuals seeking to navigate social interactions and decision-making processes, as it underscores the importance of critical thinking and skepticism when evaluating memories—both one’s own and those of others.

How To Differentiate the Leveling and sharpening from other cognitive biases?

Leveling and sharpening is meaningfully distinct from other cognitive biases in that it specifically involves the selective distortion of memories during the retelling process, emphasizing certain details while omitting others. This bias highlights the human tendency to create a more coherent narrative by simplifying complex events, which can lead to significant alterations in the original memory. Unlike other biases that might influence perception or judgment beforehand, leveling and sharpening occurs retroactively, reshaping how events are remembered and communicated.

How does the Leveling and sharpening apply to Business Operations?

Scenario:

A cybersecurity team at a mid-sized tech company conducted a routine security audit. During the audit, they discovered a significant security breach that had gone unnoticed for several months. The team held a meeting to discuss the breach, where each member recounted their experiences and observations leading up to the incident. As they shared their accounts, it became clear that details were being distorted due to leveling and sharpening. Some team members emphasized their prior warnings about vulnerabilities, while others downplayed their lack of responses to earlier alerts.


Application:

The management team decided to create a comprehensive report based on the meeting's discussions. However, the report reflected the sharpened narratives of the team members, focusing heavily on individual contributions and downplaying the systemic issues that led to the breach. This report was then shared with stakeholders, who began to form opinions based on the altered memories rather than the actual events.


Results:

As a result of the biased report, the company implemented changes based on the skewed narratives rather than addressing the root causes of the breach. This led to a false sense of security among stakeholders, who believed the issues had been resolved. Furthermore, team members began to believe their exaggerated accounts, leading to a culture of blame and miscommunication within the cybersecurity team.


Conclusion:

This example illustrates how leveling and sharpening can significantly impact the perception and response to cybersecurity incidents within businesses. By distorting memories during retelling, teams may fail to address critical vulnerabilities, leading to inadequate solutions and increased risks. Understanding this cognitive bias is vital for cybersecurity professionals to ensure accurate communication and effective decision-making, fostering a culture of accountability and continuous improvement.


How do Hackers Exploit the Leveling and sharpening?

Scenario:

A social engineer gains access to a company's internal communications by impersonating an employee. They engage in conversations with various team members about a recent project and subtly steer the discussions towards a recent security incident. As employees recount their experiences surrounding the incident, they unknowingly embellish certain details while downplaying others, influenced by the leveling and sharpening cognitive bias.


Application:

The social engineer meticulously listens to these altered narratives, identifying key individuals who emphasized their roles in the incident. They then craft a convincing phishing email that references these embellished stories, making it appear as if it is coming from a trusted colleague. This email contains a malicious link disguised as an urgent security update, exploiting the employees' distorted memories and heightened emotions surrounding the incident.


Results:

Several employees, believing they are acting on legitimate information, click the link and inadvertently compromise their accounts. The social engineer gains access to sensitive company data, leading to a significant data breach. The incident creates confusion and mistrust within the team, as employees start to question each other's recollections of the event, further isolating the social engineering attack.


Conclusion:

This example highlights how the leveling and sharpening cognitive bias can be exploited by social engineers to manipulate employees' memories and perceptions. By understanding and recognizing this bias, businesses can better train their staff to be critical of their recollections and communications, ultimately reducing the risk of falling victim to social engineering attacks. Awareness and education are key to fostering a resilient organizational culture that prioritizes security.


How To Minimize the effect of the Leveling and sharpening across your organization?

Defending against the cognitive bias of leveling and sharpening requires a multifaceted approach that emphasizes awareness, critical thinking, and systematic communication practices. First, organizations must cultivate an environment where employees are encouraged to reflect critically on their recollections and the narratives they share. This can be achieved through training sessions that highlight the nature of cognitive biases and their potential impact on decision-making. By educating team members about leveling and sharpening, they can develop a more nuanced understanding of their own memory processes, leading to greater skepticism about the accuracy of their retellings.


Furthermore, management should implement structured reporting mechanisms that promote comprehensive and objective documentation of events, particularly in the context of security incidents. By establishing standardized templates for incident reporting, organizations can mitigate the influence of individual biases. These templates should encourage the inclusion of all relevant details, both significant and minor, ensuring that narratives do not become overly simplified or emotionally skewed. Regular reviews of these reports can also facilitate discussions that challenge individual recollections, helping to surface a more accurate collective memory.


Additionally, fostering a culture of open communication can further shield organizations from the pitfalls of memory distortion. Encouraging team members to engage in collaborative discussions about events, rather than relying on individual accounts, can help counteract the effects of leveling and sharpening. Group discussions allow for the cross-referencing of memories, which promotes a more balanced understanding of incidents and reduces the likelihood of exaggerated narratives gaining traction. In this way, diverse perspectives can be shared, leading to a richer and more accurate depiction of events.


Lastly, organizations should prioritize continuous improvement through regular training and simulations focused on security awareness. These initiatives should not only cover the technical aspects of cybersecurity but also the psychological elements that influence employee behavior. By reinforcing the importance of verification and critical analysis of information, management can empower employees to recognize when their memories may be distorted and to seek clarification before taking action. This proactive approach will not only enhance the organization's resilience against exploitation by malicious actors but also promote a culture of accountability and informed decision-making.


Meet The Social Engineer

Joshua Crumbaugh

Joshua Crumbaugh
Recognizing the challenges and variation in applying psychology theory to real-world environments, I founded PhishFirewall, a security awareness and phishing training company built on these principles I’ve spent my career refining. We test and apply these concepts in diverse and practical ways to fit each organization’s unique needs.

I invite you to benchmark my company and discover how even slight changes in your approach can yield tremendous impacts on your organization’s security posture.

Hi, I’m Joshua Crumbaugh, and I’m proud to say that for over 20 years, I’ve been one of the leading Ethical Hackers in the United States. I’ve had the privilege of leading Red Teams for Fortune 500 companies, banks, governments, and large-scale enterprises, and and I routinely advises law enforcement agencies across the country and other industry leaders on emerging threats posed by human vulnerability.

The constant evolution of technology has advanced the tradecraft of exploiting people, but the good news is that people can be trained to become the most effective line of defense in any organization. Let’s work together to turn your people into your strongest line of defense.

What is PhishFirewall?

PhishFirewall is an emerging leader in people cybersecurity solutions designed to stop users from clicking on phish and empowers them to operate securely in the workplace.

AI autonomously delivers comprehensive awareness training and phishing simulations to optimize an organization's security posture and provides a one stop solution for industry specific compliance requirements. Unlike traditional tools, it provides zero campaign management, allowing administrators to strategically manage their priorities, with the added benefit of offering a streamlined, one-time setup with ongoing personalized training.
Key Benefits
Fully automate administrative management, reporting, and "just in time" communications.
Reduce organizational risk by 34% through customized training.
Increase employee engagement and performance by 42% without the punitive measures
“You set your people up in this system, and it just does it. It does it all."
– CISO, State Government
>80,000 Employees
“Once you see this in action, you can’t go back to the old way of training and testing.”
– CEO, Major Logistics Firm
>10,000 Employees
“This is security training 2.0, even the doctors do it!”
– CISO, Large Hospital
>30,000 Emoloyees

Key Features

Role-Based Phishing and Training

Tailor phishing simulations and training to each user’s role within the organization.

Customized Interaction and Testing

Adaptive training and testing based on individual performance and vulnerabilities for a personalized growth experience.

60-Second Training Modules

Quick, impactful training modules delivered in 60 seconds or less to fit seamlessly into your employees' day scaled at the frequency you want.

Complete Compliance Frameworks

Tailor phishing simulations and training to each user’s role within the organization.

Fast-Track Compliance

Accelerate your path to compliance with streamlined onboarding.

“Report a Phish” Button

Empower users to report suspicious emails with one click, improving overall security, speed of containment, and reduce the reach within the organization.

Multi-Language Delivery

Connect a global audience with training modules available in multiple languages.

Dual Coding Engagement

Enhance learning retention through dual coding techniques for better understanding and performance.

Extensive Training Library

Access a vast library of training materials that cover a wide range of security topics.

Customizable Training Modules

Create and deploy your own training modules to address specific needs within your organization.

Auto-Generated Reporting

Easily access automated reports that track progress and highlight areas for improvement.

User Report Cards

Provide individual feedback through user report cards, helping employees track their performance.

Organizational Leaderboards and Summaries

Foster healthy competition and track overall progress with organizational leaderboards and performance summaries.

Interactive Charts and Graphs

View trend analysis and performance distributions in real-time through dynamic, easy-to-read charts and tables.

Best-in-Class Administrative Dashboards

Manage your training programs effortlessly with intuitive, best-in-class dashboards designed for ease of use.

One-Day Setup

Get up and running quickly with a setup process that takes just a few hours.

Scalability

Effortlessly onboard new users and can be scaled to an organization of any size.

More In the Pipeline

We are always striving to innovate, and create the features that solve your problems!
Exclusive Offer!

Get Free Security Awareness Posters Today!

Secure your office with this months free security awareness posters!
PosterPosterPoster