- Professional Risks Insurance
- Private Clients
- Farms & Estates
- Commercial Clients
- Wholesale Insurance Broking
- Claims
- About
- Contact
- Log in
11.05.26
Workforce cyber-security training is a critical part of an organisation’s security risk management programme. Cyber-criminals don’t just target systems, devices and networks; they frequently target employees, who may use weak or reused passwords, fall for phishing scams, or click on dangerous links or attachments. In fact, 68% of cyber-breaches involve a non-malicious human element, according to a recent report by telecommunications firm Verizon. While cyber-security training programmes aim to teach employees to spot potential threats, avoid common errors and report suspicious activity, many fail to meet these goals. Traditional cyber-security training programmes have often focused heavily on compliance rather than practical behaviour change or relied on generic training materials that are easily forgotten. Since employees are an organisation’s first line of defence against cyber-threats, it’s vital that organisations review their cyber-security training is effectiveness.
This article discusses why many traditional training models fail, the implications of ineffective training and how organisations can improve their cyber-security training programmes.

Training programmes that are dense in information can be undermined by the “forgetting curve,” originally coined by German psychologist Hermann Ebbinghaus in the 1880s. Research by Ebbinghaus found that roughly 50% of new information is forgotten within one hour, 70% within 24 hours, and up to 90% within one week. Modern research continues to validate the idea of memory decline. Training research also indicates that employees may forget a significant portion of training content within a short period if they do not apply or revisit it soon after learning.
Traditional training models may also fail to achieve their objectives due to the following reasons:
Passive delivery – Corporate training programmes often rely on passive consumption of information, such as reading long manuals or watching lengthy videos. When cyber-security content is delivered passively, it can feel like a chore rather than valuable education, particularly when employees are busy. As a result, workers may rush through the material, treating it as a checklist exercise rather than something to give their full attention.
One-size-fits-all approach – Cyber-security training is often generic, divorced from real-world application, and fails to address the specific learning needs of participants. When training lacks relevant context, employees may struggle to see its purpose, reducing engagement.
Overemphasis on compliance – Many training programmes are designed to meet regulatory requirements or pass security audits. As such, they can become annual checkbox exercises that focus on completion rather than comprehension. When compliance is the goal, training may fail to build genuine understanding or translate into secure day-to-day behaviour.
When cyber-security awareness is poor among workforces, organisations may be at greater risk of cyber-attacks. Specifically, ineffective training may fail to reduce human error rates, such as susceptibility to credential theft, social engineering tactics and common mistakes that expose information or systems to risk, leaving organisations vulnerable. Research consistently finds that phishing and credential theft are among the most common initial access vectors in cyber-attacks. As such, a single employee mistake (e.g. clicking a malicious link) can unintentionally trigger a major cyber-breach that exposes an organisation to significant losses. Such incidents can lead to operational disruptions, reputational damage and regulatory or legal exposure. Ultimately, when training is ineffective, both the likelihood and impact of cyber-incidents may increase.
To improve the effectiveness of their cyber-security training programmes, organisations should consider the following tips:
Shift to continuous reinforcement-based learning. Organisations should deliver training in small, focused segments that focus on single behavioural objectives, instead of broader annual compliance exercises. Known as microlearning, this “little and often” approach can reduce cognitive overload and may solidify memory pathways. It may also be easier for employees to incorporate microlearning into their daily routines, increasing engagement. For example, rather than delivering one long session on phishing awareness, organisations could provide multiple shorter sessions on related topics such as identifying suspicious links, recognising email spoofing and practising good password hygiene.
Personalise content by role. Organisations should adapt training materials to the specific responsibilities, risks and experience levels of different employee groups. When training reflects real workplace situations, employees may find it easier to understand how it applies to their daily tasks, making content more meaningful. For example, training for finance teams could focus on phishing scams that target invoices, while IT teams might explore detecting insider threats or responding to system anomalies. Overall, training materials should directly address the intended audience, incorporate realistic scenarios and align with each department’s objectives.
Use engaging and active methods. Organisations should consider incorporating game-like elements to make training activities fun and engaging, known as gamification. This approach uses interactive elements (e.g. quizzes, challenges, badges, leader-boards) to promote active participation and keep employees motivated. Organisations should also arrange hands-on exercises that allow employees to practise threat responses in real time. For example, employees could participate in short phishing-spotting competitions, complete quick challenges to verify sender identities, or review anonymised examples of past organisational security events to understand how certain actions contributed to breaches.
For training to be fully effective, organisations must reinforce it with a culture of accountability and leadership support. Rather than a one-off training event, cyber-security should become an integral part of company culture and be talked about regularly. Leaders should reinforce the importance of cyber-security training, embed cyber-security into strategic decision-making and consistently model secure behaviours. Organisations could also identify “security champions”: influential employees who can advocate for security awareness among their peers and share tips and lessons learned during team meetings or informal conversations.
A strong security culture also depends on making reporting easy and non-punitive. Organisations should foster psychological safety by encouraging employees to express ideas and concerns openly. Minor errors should be seen as learning opportunities rather than grounds for punishment, and there should be clear, accessible channels for reporting suspicious activity. Encouraging reporting without fear of blame can promote early threat detection and strengthen overall security awareness.
Since cyber-threats continually evolve, organisations should regularly review the effectiveness of their cyber-security programmes to ensure they are meeting company objectives and staying aligned with current risks. Key metrics to track include phishing success rates, training completion rates, incident response times and simulated threat exercise results. It may also be prudent to survey employees to gauge how they are finding the training and identify any gaps in knowledge.
Cyber-attacks remain a persistent threat to organisations of all sizes, and human error is a leading cause of many breaches. Organisations can reduce their exposure to cyber-threats by strengthening their cyber-security programmes and fostering a culture of security awareness and accountability.
Contact us today for further cyber-security guidance.
Information provided by Zywave with a contribution from Lisa Langley, Cert CII, Team Leader, Professional Risks, Cox Mahon Ltd.
Complete the details below and we will contact shortly.
This Cyber Risks & Liabilities document is not intended to be exhaustive nor should any discussion or opinions be construed as legal advice. Readers should contact a legal or insurance professional for appropriate advice. Contains public sector information published by the ICO and licensed under the Open Government Licence v3.0. © 2026 Zywave, Inc. All rights reserved.