Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

The next frontier in cybersecurity: Mitigating normalcy bias

By Trevor Collins
Warning sign
January 19, 2022

It’s no secret that protecting corporate networks by implementing security best practices and policies is critically important to protecting (and guiding) users. It can take days, weeks and even months to set up the proper security solutions to help meet those goals. And even after all that, some organizations still experience breaches from silly mistakes made by users. But not all the blame falls on the user base. Security professionals are often missing an important element of security — mitigating normalcy bias.

Normalcy bias: A cybersecurity threat

Normalcy bias is a cognitive bias that leads people to disbelieve or minimize threat warnings. Consequently, individuals underestimate the likelihood of a disaster that might affect them. This is extremely applicable when thinking about cybersecurity and users. How do cybersecurity professionals balance a user base that includes those that prepare for the worst-case scenario (also known as preppers) and those that don’t (non-preppers)? Preppers often overestimate the likelihood of an apocalyptic event and suffer from worst-case thinking bias, but non-preppers easily dismiss the need to prepare for an event. When applied to cyber threats and the need to secure an organization from a breach (or other threats like phishing, etc.), normalcy bias can have a heavy impact on the execution of employee best practices. 

The unfortunate fact today is that users often understand the likelihood of a security event happening (such as a breach), but they fail to see how their actions might cause one. They don’t intend to help cause a breach, but normalcy bias allows them to believe that the actions they take won’t contribute to a negative security event. Normalcy bias also leaves users with the belief that if an event does occur, it won’t cause much damage — essentially allowing them to diminish the severity of a possible security event outcome. The reality is that users base their actions on how often they see and experience something, instead of how often something actually happens. This “user error” is a big contributing factor in security breaches.

The pervasiveness of normalcy bias

What can lead to this behavior? Often excessive warnings lead users to ignore them (and jeopardize safety). For example, when’s the last time you read the medication warning on a bottle of acetaminophen? Or noticed the temperature warning by the coffee dispenser in a gas station? 

Shifting this to organizational security, how often do users accept the updated Facebook privacy policy without reading it all the way through or read the “last login” info after connecting to a Linux shell? The sheer number of warnings users encounter daily leads many to automatically diminish the severity of the next one. The threat becomes normalized. These excessive warnings often come from a focus on protecting the creator of the warning from being held responsible instead of helping the user avoid pitfalls. 

So how do organizations work to overcome normalcy bias to help improve overall security efficacy within their user bases? There are two key elements: education and security solutions. Here are three tips to consider when looking to educate an organization:

  1. When creating security policies, cybersecurity leaders must not prevent productivity. For example, policies that block users from changing the desktop background tend to hinder productivity and create a disconnect between the user and the company, thus increasing normalcy bias. Security professionals also can’t dismiss the end goal of company growth in the name of cybersecurity. If security teams prevent growth, then they aren’t helping anyone. 
  2. Conduct quarterly training that focuses on user ability to prevent the latest threats facing the organization and the impact of user error. Embed a security-first mindset into the corporate culture starting from the top. Offer users educational materials that allow them to understand the problem and the role they play. Share real-world examples and encourage users to do the same. Ensure leadership sets good examples and advocates for best practices. Inform the users of their own importance in keeping the company secure. No one likes to admit they’ve made a security mistake. That’s why organizations need to encourage users to report errors they see or make. And once an error has happened, there needs to be follow-up with the user to ensure they understand the problem and know how to avoid it moving forward. 
  3. In many information technology (IT) and development environments, employees have tight deadlines to complete projects. From the perspective of the user, they must complete the project in the timeline provided. They also need to balance the project with security protocols and, if not given enough time, security is often the bypassed element. Regardless of job function, organizations need to build in the proper amount of time for security policies and technologies to be used. This often means that managers and unit team leaders need to be informed of the impact of cybersecurity policies and account for security training for their teams. 

Normalcy bias is often just chalked up to the need for better training, and while that is critical, it’s much deeper than that. Warnings should be designed to help the user, not just to protect the provider or vendor from liability. Eliminating normalcy bias means making a cultural shift within the organization that allows users to be the solution instead of the problem. This means making them an active part of the security strategy and arming them with the best practices, education and training so they can work to proactively help protect their organization. 

Organizations may feel the urge to provide warnings on every possible point of danger, but this diminishes the bigger problems. Users and security have a complex relationship (along with the human element involved), and mitigating normalcy bias is just one element in an organization's overall security strategy. By talking about it, the security community can work together to help better address the challenges it presents.

KEYWORDS: alerts bias cyber attack response cyber security education data breach human error security training warning system

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Trevor collins

Trevor Collins is a Security Analyst at WatchGuard Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • software

    APIs are the next frontier in cybercrime

    See More
  • cyber freepik

    Is the World Economic Forum's prediction of a global cybersecurity failure in the next 10 years avoidable?

    See More
  • Blank name tags and markers

    Zero trust: The next evolution in cybersecurity

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!