Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

The next frontier in cybersecurity: Mitigating normalcy bias

By Trevor Collins
Warning sign
January 19, 2022

It’s no secret that protecting corporate networks by implementing security best practices and policies is critically important to protecting (and guiding) users. It can take days, weeks and even months to set up the proper security solutions to help meet those goals. And even after all that, some organizations still experience breaches from silly mistakes made by users. But not all the blame falls on the user base. Security professionals are often missing an important element of security — mitigating normalcy bias.

Normalcy bias: A cybersecurity threat

Normalcy bias is a cognitive bias that leads people to disbelieve or minimize threat warnings. Consequently, individuals underestimate the likelihood of a disaster that might affect them. This is extremely applicable when thinking about cybersecurity and users. How do cybersecurity professionals balance a user base that includes those that prepare for the worst-case scenario (also known as preppers) and those that don’t (non-preppers)? Preppers often overestimate the likelihood of an apocalyptic event and suffer from worst-case thinking bias, but non-preppers easily dismiss the need to prepare for an event. When applied to cyber threats and the need to secure an organization from a breach (or other threats like phishing, etc.), normalcy bias can have a heavy impact on the execution of employee best practices. 

The unfortunate fact today is that users often understand the likelihood of a security event happening (such as a breach), but they fail to see how their actions might cause one. They don’t intend to help cause a breach, but normalcy bias allows them to believe that the actions they take won’t contribute to a negative security event. Normalcy bias also leaves users with the belief that if an event does occur, it won’t cause much damage — essentially allowing them to diminish the severity of a possible security event outcome. The reality is that users base their actions on how often they see and experience something, instead of how often something actually happens. This “user error” is a big contributing factor in security breaches.

The pervasiveness of normalcy bias

What can lead to this behavior? Often excessive warnings lead users to ignore them (and jeopardize safety). For example, when’s the last time you read the medication warning on a bottle of acetaminophen? Or noticed the temperature warning by the coffee dispenser in a gas station? 

Shifting this to organizational security, how often do users accept the updated Facebook privacy policy without reading it all the way through or read the “last login” info after connecting to a Linux shell? The sheer number of warnings users encounter daily leads many to automatically diminish the severity of the next one. The threat becomes normalized. These excessive warnings often come from a focus on protecting the creator of the warning from being held responsible instead of helping the user avoid pitfalls. 

So how do organizations work to overcome normalcy bias to help improve overall security efficacy within their user bases? There are two key elements: education and security solutions. Here are three tips to consider when looking to educate an organization:

  1. When creating security policies, cybersecurity leaders must not prevent productivity. For example, policies that block users from changing the desktop background tend to hinder productivity and create a disconnect between the user and the company, thus increasing normalcy bias. Security professionals also can’t dismiss the end goal of company growth in the name of cybersecurity. If security teams prevent growth, then they aren’t helping anyone. 
  2. Conduct quarterly training that focuses on user ability to prevent the latest threats facing the organization and the impact of user error. Embed a security-first mindset into the corporate culture starting from the top. Offer users educational materials that allow them to understand the problem and the role they play. Share real-world examples and encourage users to do the same. Ensure leadership sets good examples and advocates for best practices. Inform the users of their own importance in keeping the company secure. No one likes to admit they’ve made a security mistake. That’s why organizations need to encourage users to report errors they see or make. And once an error has happened, there needs to be follow-up with the user to ensure they understand the problem and know how to avoid it moving forward. 
  3. In many information technology (IT) and development environments, employees have tight deadlines to complete projects. From the perspective of the user, they must complete the project in the timeline provided. They also need to balance the project with security protocols and, if not given enough time, security is often the bypassed element. Regardless of job function, organizations need to build in the proper amount of time for security policies and technologies to be used. This often means that managers and unit team leaders need to be informed of the impact of cybersecurity policies and account for security training for their teams. 

Normalcy bias is often just chalked up to the need for better training, and while that is critical, it’s much deeper than that. Warnings should be designed to help the user, not just to protect the provider or vendor from liability. Eliminating normalcy bias means making a cultural shift within the organization that allows users to be the solution instead of the problem. This means making them an active part of the security strategy and arming them with the best practices, education and training so they can work to proactively help protect their organization. 

Organizations may feel the urge to provide warnings on every possible point of danger, but this diminishes the bigger problems. Users and security have a complex relationship (along with the human element involved), and mitigating normalcy bias is just one element in an organization's overall security strategy. By talking about it, the security community can work together to help better address the challenges it presents.

KEYWORDS: alerts bias cyber attack response cyber security education data breach human error security training warning system

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Trevor collins

Trevor Collins is a Security Analyst at WatchGuard Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • software

    APIs are the next frontier in cybercrime

    See More
  • incorporating power management cybersecurity for an end-to-end security solution

    Power management: The next frontier in securing your enterprise

    See More
  • cyber freepik

    Is the World Economic Forum's prediction of a global cybersecurity failure in the next 10 years avoidable?

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing