
If you know me, you know that I am passionate about cybersecurity and feel that the human element is too often ignored or handled with very little focus. This is why I think this is a mistake.
In the modern threat landscape, cyberattacks have become more than just a technical nuisance, they’re a constant and evolving menace. Organizations of every size are in the crosshairs, and unfortunately, there’s no magic solution. But if there’s one area where a lot of damage can be prevented, it’s by addressing human risk. That’s one place where security awareness training and simulated phishing exercises come into play. They’re not just another checkbox; they’re a crucial part of your layered security strategy.
Training and simulated phishing is not going to make the problem go away, but neither are any technical controls. These things need to be used together and we have to consider preventative controls to keep social engineering attacks from reaching the users, non-technical controls (*cough* *cough* *training*) for when they do, and more controls in case the user has a lapse in judgement and has an interaction with the attack. Defense is like an onion (or perhaps an ogre) and has layers. Here I’m talking specifically about the education part.
The Threat Landscape: Evolving and Ruthless
Cybercriminals don’t discriminate. They use whatever works, and increasingly, that means targeting people. Whether it’s ransomware, social engineering, or good old-fashioned social engineering, bad actors rely heavily on exploiting human error to get a foot in the door. It’s not the users fault really. We are all human and subject to making mistakes if we get the right message, about the right thing, at the right time. I can tell you stories about myself and other advocates having all falling for simulated phishes at one time or the other. It really is easy to do and it’s not about how smart we are, so let’s stow the blame and work on ways to equip people to protect themselves.
- Phishing’s Persistence
The FBI’s Internet Crime Complaint Center reported over 300,000 phishing complaints in a single year. That’s not noise—it’s a wake-up call. - The Human Factor
According to KnowBe4 (hey, I know them!), a leading provider of security awareness training, a substantial number of successful breaches stem from employees clicking on malicious content. Training isn’t optional, it’s essential.
Why Security Awareness Training Matters
Think of your employees as the last line of defense. You wouldn’t send soldiers into battle without training, or a surgeon into the O.R. without practice. Cybersecurity should be no different.
- Enabling Human Firewalls
Trained employees recognize red flags and stop attacks before they start. - Faster Incident Detection
Educated users identify and report threats early, speeding up your response. - Compliance and Risk Reduction
Regulations like GDPR and HIPAA demand security awareness efforts. Noncompliance can be costly.
Simulated Phishing: Practice That Pays Off
You test your fire alarms. Why not your people? Simulated phishes are not about tricking people. Crazy thought huh? It’s about giving them a chance to practice what they learned in training, without the risk to the organization. Messaging around this is critical so users know you are not trying to make them look or feel foolish, but instead giving them a chance to practice. This helps them at home as well as in the organizations. Scammers and scams are a part of life, the skills used to spot scams are invaluable personally as well.
- Behavioral Conditioning
Simulated phishing builds reflexes. Over time, employees become more resilient. We want to change behavior, not just throw information at people. - Cultural Shift
Regular testing embeds security into your organization’s culture. As more people change behavior, the culture shifts and before you know it, there is momentum. - Actionable Metrics
These exercises offer real data to target training and track improvements. There is good information here, such as the types of attacks certain people, departments, or even the whole organization, are more likely to fall for. Use this information to make education have a better ROI. Why waste valuable attention span and training teaching people stuff they already have a firm grip on?
But Isn’t It Expensive?
Training costs money, but a breach costs a lot more. IBM estimates the average breach at $4.45 million. Some studies are higher, some a little lower, but all agree that it’s expensive and can have a serious impact on your brand reputation. That click on a fake invoice email could lead to ransomware, stolen data, or worse, and frankly there are a lot of other way more expensive products/controls that don’t do as well. Be wise when looking at ROI.
Building a Smart Program
- Know Your Baseline
Evaluate where your team stands before you start. - Stay Current
Update training regularly to match the latest threats and provide short modules fairly often. - Keep It Engaging
Boring or irrelevant training doesn’t work. Use variety and interactivity to keep people interested.
Final Thoughts
Let’s be real, cyberattacks aren’t going away and technology alone won’t save you. Arm your employees with knowledge and experience. Security awareness and phishing simulations are not “nice to haves”, they’re a critical part, but not the only part, of a human risk management (HRM) program..