Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity Education & Training

Getting employees invested: Overcoming complacency to emphasize security

By Chip Witt
Security culture - building a culture that works
June 18, 2021

There’s no denying last year was chaotic. We had to navigate major social unrest, a divisive presidential election and of course, a global pandemic. To make matters worse, cybercriminals took advantage of people working remotely and spending more time online and ramped up their attacks. 

With all of the chaos and turmoil, it would be easy for people to just throw up their hands and forget about smart security practices within the enterprise. In fact, it seems like that’s what a lot of folks did. As security professionals, our job is to thwart hackers by combining systemic safeguards with teams empowered to make sound decisions. With vaccinations rolling out and many people returning to the office, now is an opportunity to reinforce the importance of security hygiene and build a security structure and culture where your employees are invested in making better choices.

To do this, we first have to understand the psychology behind human decision-making. Many clinicians break thinking into two segments. The first segment houses our immediate reactions, or what many people would refer to as your instinct. These are thoughts that occur automatically with very little effort. The second segment is more complicated and requires our brains to concentrate and solve problems. 

Building strong security habits requires a combination of both modes of thought because people’s first instincts may not lead to the best choices, nor can every person be an expert on every best practice. Instead employees need the encouragement to stop and use their critical thinking skills to make smart decisions that become instinctual. In other words, your colleagues need to understand the importance of their security choices and actively participate in the process. If users are given the idea that protecting the enterprise falls solely on their employer, they are far more likely to be complacent, make bad choices and ultimately open themselves and their organizations to an attack.

In the cyber realm, password security is a great example. Many users' first instinct is to choose something easy to remember or something they’ve used before, which means it may be easy for criminals to crack. To make matters worse, they often use that password across multiple accounts, creating avenues for credential stuffing attacks and account takeovers. Some companies offer password managers to encourage the use of long, complex and unique passwords, but password managers aren’t foolproof. They are only as strong as the user’s master password. If your team members never get into the habit of choosing strong, unique, 16+ character passwords in the first place, a password manager is going to do little to mitigate risk. 

Part of the challenge with getting users to set strong passwords – or take other security precautions for that matter – is that they think their companies have them protected with firewalls and proactive network monitoring. While businesses should take those precautions, they aren’t the be-all-end-all. Just because you know your bank has your money locked in the vault, it doesn’t mean you aren’t going to put a PIN code on your debit card.

This principle can also be applied to a major problem born out of the pandemic. Researchers reported an overlap last year in the personal and corporate data collected from botnet logs (the outputs of keylogger malware infections), showing that people are increasingly using company devices for personal business, and logging into company accounts from their personal phones and laptops. Because keyloggers capture plaintext credentials and the URLs they are associated with, they may enable cybercriminals to access company networks and steal information while evading detection. Since many employers plan to still allow employees to work-from-home at least part time, it’s important to address this issue head on. While you can require employees to use a virtual private network (VPN) and install anti-virus and anti-malware software, ultimately your employees are responsible for keeping their devices separate. They need to understand why it matters.

One way to do this is education. Security is complex, and new threats emerge all the time. Shedding light for your team on the frequency and gravity of these increased threats can drive home the point that employees need to protect themselves both at work and at home. With cybersecurity training, phishing awareness training and learning how to spot social engineering emails can help keep company data safe, and also gives your employees the skills they need to keep their own personal information from falling into hackers’ hands.

After you’ve established an ongoing literacy and training program, think about ways to reward your team for making good security decisions. Researchers have figured out that positive feedback motivates people to act far more than any perceived threats. So, consider implementing some type of recognition system. It can be as simple as sending a positive email when an employee reports a suspicious link, or implementing a cybersecurity leaderboard to add a little friendly competition. Small daily or even weekly touchpoints like this contribute to the idea that every single team member is equally responsible for keeping the enterprise secure.

Your employees are the key to smarter security. Whether your team is staying fully remote or moving back to the office, we’re in a unique time where everyone is once again adjusting to a ‘new normal.’ Take advantage of this transition to re-establish company security rules and build them into your culture so that every employee is invested. Who knows? Maybe empowering people to make better security choices will help them feel a greater sense of control during the chaos and keep their enterprises safer at the same time.

 

KEYWORDS: enterprise enterprise physical security enterprise security security awareness security culture

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Chip Witt is vice president of product management at SpyCloud.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

    See More
  • Employees’ Security Hygiene Getting Worse as Ransomware Exposes Insider Negligence

    See More
  • digital workplace

    Overcoming Human Error to Secure the Smart Workplaces Transformation

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing