Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Leadership and ManagementSecurity Education & Training

Humanizing security: Putting people first for stronger security

By Ken Fanger
Employees high fiving

Image via Unsplash

February 23, 2023

Cybersecurity approaches traditionally protect data and users by determining the most effective and secure processes, tools and programs, regardless of complexity and user impact. Alternatively, umanizing security is a security approach that prioritizes the people that need the security more than the items to be protected.

Security should be designed, implemented and supported by starting with the people. If items are made “secure,” but unusable for those who use them, security will be resisted, which results in less protection than expected (and required). As explained in the 2005 research study, "The User is Not the Enemy," by Anna Adams and Angela Sasse, complex security would keep out the most threats, but would make using it too hard for the people it is trying to protect.

When designing security, in addition to how secure it makes things, there needs to be consideration for how much it harms users in its implementation. Overly-complex, non-humanized security is like a classic Corvette encased in cement: It is secure and no damage can be easily done to it, but ultimately it has no value — it cannot be driven, seen or enjoyed. Security that is too hard to use or too disruptive to its users is therefore not as valuable because its complexity has a negative impact on the user that prevents its full effectiveness.

Humanity should be considered in each step of security, which includes preparation for an attack, response during an attack and recovery after an attack. The last step, the recovery, is where security professionals most often drop the ball concerning the human element of security. The financial cost of an attack is considered, but the emotional cost of recovery is not. Security professionals must question: Did the attack result in an employee being too afraid to take action, cause emotional damage or result in corporate paralysis due to fear of another attack?

Humanizing security goes even farther than material impact and argues that cyberattacks hurt people beyond the financial loss and cause emotional damage that affects performance, quality of life and outcomes. Not addressing these issues as part of the security process can leave users hurt and alone. Imagine an accounts receivable clerk is wire frauded for $123,000. What does that do to their future workability? What does that do to how others view them? Both of these questions suggest an impact of cyberattacks that is often underestimated.

In a humanized security approach, for security to be functional, it needs to be seen as valuable, manageable and relevant from the user’s perspective:

  • Valuable: Do users fear the threat? Do they think someone may try and attack them? Do users feel safe enough right now?
  • Manageable: Can users implement the security and still do work in a reasonable way?
  • Relevant: Do users value the security? How does it affect their life? Do users understand how security keeps them working and safe?

Without having these three elements, security will be resisted by users and the impacts of emotional stress incurred by attacks will remain unaddressed. As an industry, security professionals need to see beyond the technical issues to the human issues. Security is about the human experience first and is supported by the technology next.

KEYWORDS: cyberattack cybersecurity humanitarian security management security management tools stress

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ken Fanger, MBA, CMMC-RP, is the President of On Technology Partners.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

Person in red hoodie

When Metal Theft Becomes a Life Safety Crisis

Stacked books

Safe Learning 101 Program Supports Schools in Strengthening Campus Security

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

May 21, 2026

From Referral to Response: Managing Domestic Violence Threats in the Workplace

Domestic violence remains a complex driver of workplace violence, creating high-risk scenarios that require coordination across departments without clear ownership. Learn how threat management teams can manage domestic violence referrals from the start.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • Using Architectural Elements for Stronger Security

    See More
  • Putting ‘First’ into First Responders

    See More
  • cyber camera

    How to Change Behavior for Stronger Security System Cybersecurity

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • October 16, 2025

    Stronger Together: Elevating Security Through Strategic Partnerships

    ON DEMAND: In the complex and rapidly evolving threat landscape of today, no campus stands secure in isolation. Discover how strategic partnerships can transform fragmented efforts into unified security strategies that protect people, assets, and the institutional mission.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing