Why An Effective Security Culture Is Essential For Your Organisation

With data breaches spiralling out of control, it’s time that organisations change their approach to fighting information security threats.

There’s a long-held, mistaken belief that this is an IT issue that can be fixed with more reliable software and a keener eye on technological flaws. In reality, employees are just as likely to cause a data breach as a bug in your system, and unfortunately there’s no simple patch for human error.

Rather, it takes an organisation-wide commitment to security, as you educate staff on the risks they introduce to your business and get them to break bad habits.

The problem with staff awareness training
When experts talk about educating employees, they generally refer to staff awareness training. In most organisations, this takes the form of online or in-person courses that take place once a year. More vigilant organisations might run two or three a year, but they’re nonetheless rarities – distractions from your everyday work – rather than part of an ongoing, structured approach to cyber security.

It’s not hard to see why employees might resent these courses. They interrupt their working week and knock them off schedule, and tend to comprise being lectured on how to do seemingly simple tasks, like sending emails or creating passwords.

This is why staff training alone can only do so much. Sure, employees will retain some of what they’ve been told, but true progress takes a willingness to learn.

That means building a culture of cyber security in which organisations take the time to show staff the real-world consequences of poor data protection practices.

It’s one thing to give them a PowerPoint presentation with stats like “23 million people in the UK use ‘123456’ as their password”, but it’s something else to explain why that’s a bad thing. The answer might sound obvious, but you’d be surprised at how often there are knowledge gaps between the errors that cause data breaches and the advice for preventing them. 

Let’s take a look at some examples.

Where employees are going wrong
Employees are generally aware that passwords should be a combination of at least eight letters, numerals and special characters (although there are arguably better ways of creating strong passwords), but that doesn’t really cut to the issue.
As a result, employees might create passwords such as ‘Password#1’. It meets all the criteria, but it’s not going to protect your account – being, as it is, a minor variation on one of the most popular login credentials.

The same thing applies to phishing emails. You can warn staff all you like to look out for suspicious messages and unsolicited, urgent requests, but the scams are successful not necessarily because victims are ignorant but because they’re careless.
Victims of phishing emails are, in many cases, aware of the threat of these scams but were caught out in the heat of the moment.

That’s exactly why phishing is so dangerous: the seemingly urgent nature of the messages can make us ignore any faint alarm bells that ring as we dimly recall a warning from a training session we once took.

The only way to tackle people’s impulse to click phishing emails is to engrain good habits into them. Employees should be capable of immediately recognising suspicious emails in the same way that they should intuitively know what makes a strong password.

Because contrary to a lot of evidence, staff awareness training doesn’t have to be complicated. The only thing that’s lacking is the time and commitment towards rooting out bad habits.

Creating a culture of cyber security
Developing a culture of cyber security is as simple as making staff awareness part of your day-to-day operations.
Training courses should remain the backbone of your efforts, and e-learning is an ideal way of delivering lessons. It’s affordable, staff can take the course at a time that suits them and it gives you a reliable audit trail. That means you can see who has taken the course and, just as importantly, who hasn’t.

You should complement training with visual reminders that enforce these lessons, like posters and email signatures containing security advice.

Perhaps the most important thing you can do is to practise ‘nudge theory’. This is a type of behavioural science that prompts individuals to make smart decisions by using indirect suggestion and positive reinforcement.
The approach is intended to help employees rationalise why certain processes are necessary, meaning they’re making smart choices by habit rather than from memory.

Subtle things like these might not seem as though they’ll make a huge difference, but remember: the devil is in the detail.
Just as you break bad habits in your personal life through small, routine gestures and reminders of your bad ways rather than one grand statement, so too does effective data protection require regular nudging. 

So don’t leave your organisation’s information security wellbeing to your IT department or staff awareness training providers. Make it a part of your day-to-day activities and encourage everyone to play their part.

About The Author: Luke Irwin
Luke Irwin is a writer for IT Governance. He provides news and opinions on a variety of information security topics, and was nominated for the 2019 European Cybersecurity Blogger Awards.

 

 

 

« New York’s Albany Airport Pays Ransom
5G Will Reduce Car Accidents »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

CertiKit

CertiKit

CertiKit produce toolkit products that accelerate the adoption of ISO/IEC standards, including ISO 27001, helping organizations all over the world to realize the benefits as soon as possible.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

Quick Heal Technologies

Quick Heal Technologies

Quick Heal Technologies is a leading IT security solutions provider focused on endpoint and network security solutions.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

NSHC

NSHC

NSHC is a provider of mobile security solutions, cyber security consulting and training, and offensive research.

DAkkS

DAkkS

DAkkS is the national accreditation body for Germany. The directory of members provides details of organisations offering certification services for ISO 27001.

Phoenix Cybersecurity

Phoenix Cybersecurity

Phoenix Cybersecurity Services and Managed Security Services help clients just like you take full advantage of leading cybersecurity technologies and industry best practices.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

Mission Critical Partners (MCP)

Mission Critical Partners (MCP)

Mission Critical Partners is committed to delivering innovative solutions that help our clients enhance and evolve their critical-communications systems and operations.

SecOps Group

SecOps Group

SecOps Group is a boutique cybersecurity consultancy helping enterprises identify & eliminate security risks on a continuous basis.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

CyBourn

CyBourn

Cybourn's diverse offerings include engineering, analysis, product development, assessment, and advisory services in the cybersecurity space.

Vernetzen

Vernetzen

Vernetzen is an industrial network and cybersecurity innovator focused on delivering practical solutions to connect and secure industry across the globe.

Whalebone

Whalebone

Whalebone develop user-centric, no-installation network security products for telcos, internet service providers, enterprises, public institutions, and governments.

HeroDevs

HeroDevs

HeroDevs is the trusted leader in providing secure, long-term support for deprecated open-source software.