Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireTechnologies & SolutionsSecurity Leadership and ManagementSecurity Education & Training

How to effectively communicate cybersecurity best practices to staff

By Perry Carpenter
Employees gathering

Image via Pixabay

February 2, 2023

Cybersecurity isn’t the sexiest topic for employee communications. In fact, it’s fair to say that most employees’ eyes glaze over when they see or hear “security.” But organizations that get it right — and get employees engaged — can create the change that’s needed to protect their systems and data.

What does it take? It takes a little creativity and a lot of consistency to move the needle towards a win-win result.

Ban the buzzwords

Communicating effectively is always important, but when communicating about cybersecurity it’s especially important. Security is everyone’s responsibility and the majority of successful cyberattacks are the direct result of human-related causes.

To reach people outside the world of IT and cybersecurity who don’t understand tech jargon, it’s necessary to ban the buzzwords. Not only do tech terms have the undesirable effect of making people feel excluded, some perceive their use as trying too hard to impress, according to a poll of 1,500 workers conducted by Enreach. While every industry has its own jargon, technical terms and industry slang are likely to be misunderstood by people outside the IT/security space.

Understand the stages of competence

When people learn something that is designed to change their behavior, they go through a series of stages termed as the “stages of competence.” These stages apply whether one is learning a new language, starting a new job or identifying a suspicious link in an email.

Here’s how these stages work:

  • Stage One: Unconscious incompetence — At this stage, people are simply oblivious. As applied to cybersecurity, this would be an employee who has no idea that clicking on links in suspicious emails or texts could lead to a serious security breach.
  • Stage Two: Conscious incompetence — At this stage, the subject doesn’t know the material, but wants to learn. Continuing the above example, the employee recognizes the danger of a cybersecurity hack or phishing scam and wants to learn how to avoid them, but isn’t sure what steps to take.
  • Stage Three: Conscious competence — Here, the individual knows what needs to be done, but it requires effort or direction. As it applies to cybersecurity, the individual knows more about suspicious links and how to identify one and may refer to a checklist to double-check or consult with someone who knows more.
  • Stage Four: Unconscious competence — At this stage, the person has the skills and automatically knows what to do. It has become second nature. The employee can spot the suspicious link without referencing a checklist and knows what to do — report and delete it, whether it’s a simulation or a real suspicious email or link.
  • Stage Five: Mastery — Here, the employee is an expert at the skill or task and can help others. At this stage, the individual can spot suspicious links competently and can train others to move through the stages.

It takes time, repetition and focus to ensure that employees embed the knowledge they need and move from unconscious incompetence to, at a minimum, conscious competence. This is where true behavior change occurs. This is where security culture can be created and supported.

How to get employees there

To move employees from unconscious incompetence toward mastery, it’s important to speak in a language and terms that they will understand, using approachable, descriptive and inclusive language.

When starting, assume the group knows nothing so that no one falls through the cracks of assumed knowledge. Not everyone will raise their hand and ask a question if they don't understand something. Keep in mind that disengagement occurs the moment something is not understood.

But meeting employees where they are in terms of understanding and knowledge, without judgment or condescension, can help them get to where they need to be. Once the importance of security is understood, it is likely employees will see the value in their personal role and responsibility to cybersecurity.

There are a lot of elements required to communicate when it comes to cybersecurity. Knowing how to do so effectively increases success. When communication is well done, engagement will occur. Understanding how people move from learning to behavior change will improve the security culture as people will embed the knowledge and act upon it, even when no one is watching.

KEYWORDS: communication cybersecurity IT management security education training

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Perry carpenter

Perry Carpenter is author of Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors (Wiley, 2019). Working with noted hacker Kevin Mitnick, he is Chief Evangelist/ Strategy Officer for KnowBe4, developer of security awareness training and simulated phishing platforms with over 30,000 customers and 2 million users. He holds a MS in Information Assurance (MSIA) from Norwich University and is a Certified Chief Information Security Officer (C|CISO).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security compliance

    8 steps to achieving cybersecurity compliance

    See More
  • employee-training-freepik58365.jpg

    Try creating employee personas to customize your security communications efforts

    See More
  • risk management freepik

    3 steps to promote a human-centric security awareness culture

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing