Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Outdated cybersecurity training erodes trust, hurts more than it helps

By Heather Stratford
security training freepik
July 12, 2021

Cyber education started roughly 30 years ago as a technical area for IT professionals, but as technology and the internet expanded, the need for training shifted from the elite few to all employees using computers and accessing files. In the last decade, cyber education shifted to Learning Management System (LMS) driven training with an emphasis on phishing. But despite this, breaches are still on the rise with phishing attacks accounting “for more than 80% of reported security incidents.”

 

Why Phishing Tests Don’t Work

As phishing grew in its complexity and frequency, new companies emerged offering to “phish” an organization’s employees. The primary reason given for this type of trickery was to “test” the employee. The belief was that by phishing an employee, organizations could somehow prevent employees from falling for real world phishing attacks.

But phishing is not a static form of attack. There are millions of different variations of phishing. Criminals try different messages and change them daily to see what works. A skilled individual could achieve an 80% click rate on a phishing email just by knowing a few key things about an organization.

Phishing an employee as a form of training doesn’t work. Not only is it too narrow—often covering only one specific type of email—it doesn’t equip the employee with the skills to spot new attacks. Worse, it is a punitive approach that leaves employees nervous and sometimes numb. If it creates any behavior change, it’s not the kind an organization really wants.

 

New Technology, New Training—Enduring Wisdom

Traditional cybersecurity training can be individual or LMS-based and generally hinges on a 30- to 60-minute session of basic training once a year. There will be some visual reminders taking the form of emails or posters during the year. But regardless of the minor variations, traditional training doesn’t work. Both content and delivery need to be agile and updated to remain relevant with the constantly changing cybersecurity landscape. New approaches to cybersecurity awareness training include a shift to mobile devices, a daily or weekly cadence, team and department interactions, leaderboards that spur friendly competition, specific industry relevant content, and shorter training called microlearning.

Training that is built around microlearning is remembered. It was Hermann Ebbinghaus’ pioneering research in the late 1800s that “discovered that without any reinforcement or connections to prior knowledge, information is quickly forgotten—roughly 56% in one hour, 66% after a day, and 75% after six days.” To increase retention, it is essential to make as many connections as possible and repeat the information. An hour of training—or worse: longer—once a year, isn’t how people learn and retain information. People learn from continual review and building concept upon concept Just like one doesn’t go to the gym once a year to keep muscles fit, the mind is a muscle. Exercise and train daily in small doses to maintain and improve performance. Those daily sessions are microlearning—this is how the mind works best.

 

Avoiding Cyberattacks

Cybersecurity education is the number one way that organizations can help prevent cybercrime. According to a CybSafe analysis of data from the UK Information Commissioner’s Office, 90% of breaches can be traced to human error.(4) Whether it is the network configuration or inadequate training of an end-user, people are what make an organization vulnerable or strong. Here are 5 ways to help your organization fight cybercrime:

  1. Train Employees Frequently. Organizations give time to what matters. Understanding the importance of a message reinforces it. Remind employees often what behaviors are truly important. Remember also that people learn in different ways. Hearing a message in various formats helps learners absorb and access information better.
  2. Password Management. Passwords are literally the keys to the kingdom. Provide password management solutions for managers to keep track of passwords and shift away from Post-it notes hidden near the computer screen.
  3. Frequent Patching. Updating software is a critical function of closing vulnerability holes. Known vulnerabilities are attacked by criminals on a daily basis. “60% of breaches involved vulnerabilities for which a patch was available but not applied.” Update and patch regularly.(5)
  4. Remote Workers. Provide VPNs and firewalls for more secure access to sensitive data. Don’t assume employees have correctly set up routers or follow secure WiFi protocols at home. Make sure they have guidance that will keep the company’s information secure when working from home.
  5. Backups. Backup your system and critical information regularly. Keep these backups secure and separate from your network. Ransomware is getting trickier and more aggressive—but having important data backed up gives peace of mind and helps with both prevention and recovery when it comes to ransomware attacks.

Cyberattacks shift and evolve. Training has to keep up. Although cyber education has been around for almost 30 years, it has just begun. Cybersecurity education is here to stay and will continue to get better and more tailored to the individual and organization’s needs. So, train, train often, and train efficiently.

KEYWORDS: cyber security employee training phishing risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Heather stratford

Heather Stratford is Stratford is the Founder of Drip7 and a thought-leader in the IT Training and Cybersecurity field. She keynotes at conferences, universities, and for enterprise clients. She writes on cybersecurity and has been featured and written for such global organizations as the 2018 G7 Summit held in Canada. Stratford regularly speaks about Cybersecurity, Women in Technology, Women and Diversity in Cybersecurity, creating a Cybersecurity Culture, Entrepreneurship, Privacy, and the shifting regulations and how to manage cybersecurity risks.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • gamify the cybersecurity training process

    A hundred-year-old secret is key to fighting cyberattacks

    See More
  • Woman looks at computer

    Cybercrime hurts some population groups more than others

    See More
  • Microphone

    Cybersecurity needs more than strong tech, it needs strong messaging

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing