Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

4 barriers to teaching employees good cybersecurity habits — and how to overcome them

By Chris Willis
smb-cyber
July 2, 2020

Proper training is undoubtedly a top defense against cybersecurity breaches. IT policy, physical security, firewalls and other technical precautions are obviously necessary, but teaching workers what to do—and what not to do—lays the groundwork for a strong, secure front line defense to support all other security measures.

The importance of cybersecurity training is clear, but that doesn’t mean that it’s always easy. Too often, real barriers stand in the way of properly teaching the security measures that can save a business millions in cleanup costs and lost productivity—not to mention the hit to brand reputation and future sales if sensitive data is compromised.

Obstacles including budget concerns, time constraints, stubborn company culture, or a lack of cybersecurity best practices can seem overwhelming, especially to a smaller organization with limited resources. Fortunately, there are reasonable solutions to each of these roadblocks that can help all organizations be more secure.

 

1. I don’t know enough about cybersecurity myself.

It’s common for training to fall completely under the umbrella of the HR department. Of course, while some HR professionals are highly tech-savvy, they are also faced with many competing demands, and few have the bandwidth available to stay current on technology and cybersecurity best practices. While there are mountains of information available online, all of this data can feel overwhelming—and often offers conflicting advice.

The good news is these days you don’t need to be an expert in cybersecurity to help your workforce understand the basics of protecting themselves and the company’s information and assets.

There are a variety of great online learning resources created specifically with cybersecurity training in mind. Several platforms offer the ability to purchase a pre-designed course to adequately cover the most critical cybersecurity practices. Look for courses that address these important points:

  • Recognizing phishing campaigns
  • Password management
  • Two-factor authentication
  • Reporting suspicious activity
  • Solutions to both major and minor security issues

Larger organizations may consider working with a third party to craft a customized eLearning course that delves into specific IT policies, processes, and solutions regarding cybersecurity.

2. It costs too much.

It can be difficult to get budget dollars allocated to training. It’s easy for leadership to brush off educational needs for an organization, hoping that HR will somehow find a way to fill in all the gaps.

The solution? Learn to speak the language of business. When it comes to cybersecurity training, the path to C-suite support is through  ROI (Return on Investment) and Risk Management. How will money spent on cybersecurity training work for the bottom line of the company?

Some of the benefits of investing in professional cybersecurity courses:

  • The average cost of a cyberattack is almost 4 million dollars, and this number increases every year. Quality training can help avoid these costs.
  • According to a major study conducted by the American Society for Training & Development (ASTD) in the 1990s, businesses that spend at least $1,500 per employee annually on training activities reportedly earn 24 percent more profit than those with lower training budgets.
  • Cybersecurity training and certification can protect an organization from lawsuits in the event of a data breach. The stronger and more consistent the training program, the better defense it is in a legal proceeding.
  • In a single year, 62 percent of businesses experienced some form of phishing or social engineering attack.
  • Cyberattacks cost $45 billion in 2018 alone.

Showing the numbers and real-life repercussions of cyber threats can help make a case for investing in training.

For truly small businesses or startups that don’t have the cash to spare on training, educating yourself and anyone on your team is still critical. Fortunately, free online tools make training more accessible than ever before.

From webinars and downloadable content to articles just like this one, low-cost resources are abundant. Use caution in selecting sources you can trust, and look for information dated within the last couple of years. Cybersecurity technology moves at a breakneck pace to keep up with hackers, so advice and best practices change over time as well.

3. I don’t have time.

It’s easy to feel like there are never enough hours in the day. Business owners or department heads are expected to wear many hats and account for almost every minute of their working time.

Just as budgets need to include investment to prevent significant profit loss, an organization must invest in time for cybersecurity training.

Consider this: the average amount of downtime caused by ransomware attacks in the second quarter of 2019 was almost 10 days. That’s 80 hours that each worker is stopped from doing their job altogether. Even once systems are back online, getting to the source of the attack and ensuring it doesn’t happen again consumes the IT department, diverting valuable resources from maintenance or new initiatives.

The staggering amount of time a cyber attack can cost a business helps justify making a quiet moment during the week to help teams confidently recognize the signs of a phishing scam and audit their personal and professional passwords.

In as little as an hour of time, you can train workers to avoid mistakes that will cost the organization many, many more hours in lost productivity if cybersecurity is ignored. A microlearning approach can offer even greater flexibility for fitting in training between other activities, making the time investment even easier to manage.

4. Company culture. 

If cybersecurity isn’t already on the minds of the people in an organization, it can be hard to push through the idea of setting aside dedicated time and budget for training. Statistics and logic are convincing to some, but without clear organizational buy-in and behavior change by workers, even a good training program cannot yield optimal results.

Developing a cybersecurity culture requires a message of accountability from the top in order to drive organizational behavior change. The best way to get everyone on board is to show them how a data breach impacts them personally. Many workers fail to understand the far-reaching reverberations of a cyberattack.

Attackers go after things of value—usually money or data. When that data includes the personal, private information of customers, the loss of trust can be long-lasting and costly. This downturn in an organization’s reputation hurts everyone tied to the brand.

Less trust in the company means the sales team will struggle. Loss of revenue can mean lower or no bonuses at all. Further, the costs of the breach must come from somewhere. If there’s no increase in revenue, this means that budgets will be cut from other projects, and everyone has to pick up the slack.

Team members are also customers in many cases—they get discounts and perks for buying from the company. That means their data is also tied to the security of the organization and is vulnerable if all workers aren’t properly trained and follow protocols.

When coworkers fail to practice good cyber health, they put everyone around them at risk. Understanding how everything is tied together in this way can help evolve the company culture and make cybersecurity training something everyone values enough to follow through on.

 

These barriers to teaching proper cybersecurity habits are a real struggle for many businesses. That said, the reality of cybersecurity risk is too great to brush off training in the face of obstacles.

No organization is immune. Even Justin Bieber had his data stolen in the MGM breach. If it can happen to a large corporation with a lot of resources, a cyberattack can happen to anyone. When the budget and time can be found for training, company culture can be shifted through education, and the right security habits can be learned through online resources or by purchasing a professional course. Working towards tighter cybersecurity is one of the best things a business can do to protect their workers, customers and their bottom line.

 

This article originally ran in Today’s Cybersecurity Leader, a monthly cybersecurity-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: cyber security data breaches risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chriswillis

Chris Willis is the Director of Content for eLearning Brothers. Previously, Chris founded and led Media 1, an award-winning eLearning firm. For over 20 years, Chris has performed a hands-on role designing and leading development of innovative learning solutions for global enterprise businesses across a wide range of subjects and vertical industries. She has earned numerous recognitions for her personal leadership, the way she conducts business, and the work she produces.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • IT-fail

    5 Common Pitfalls in IT Security & How to Overcome Them

    See More
  • Jordan Avnaim podcast news header

    CISO strategies: Modern challenges and how to overcome them

    See More
  • cyber security freepik

    Cybersecurity allies: Why you need them and how to find them

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing