Why security awareness training doesn’t work — and how to fix it

Why security awareness training doesn’t work — and how to fix it

This audio is auto-generated. Please let us know if you have feedback.

Government agencies, private businesses and nonprofit organizations have spent decades trying to teach their employees not to click suspicious links or download untrustworthy files, but recent evidence suggests that this cybersecurity awareness training is largely ineffective and possibly even counterproductive.

Organizations rely on cybersecurity education, from phishing simulations to annual webinars, to train their employees to identify and block digital threats. The security industry tells organizations that people are their weakest link and emphasizes training as the solution, and a cottage industry of cybersecurity training programs has sprung up to meet that need. But these programs — a cornerstone of the modern security strategy — are missing the mark.

Common cybersecurity training methods do not significantly reduce people’s likelihood of falling for phishing attacks and in some cases actually make people more susceptible to those attacks, according to a Cybersecurity Dive review of more than a dozen studies and meta-analyses published since 2008. The studies cast doubt on the value of mandatory training, critique the lessons provided to people who fail tests and highlight methodological flaws in earlier research.

“Awareness training, as it is, is not a solution,” said Arun Vishwanath, a cybersecurity researcher and consultant who studies human behavior. “The analogy I use is, you go to the doctor’s office and he throws a pill at you, which is awareness training. And then you go back, and the patient’s still sick, and they give you more of it, and they keep giving you more of it, and in the end, they blame you.”

Unintended consequences

Most organizations that deliver cybersecurity training do so in one (or both) of two ways: periodic assessments, often conducted annually or monthly, and embedded training lessons, which are displayed after a user fails a phishing test. But recent studies have questioned the efficacy of both of these landmark tools.

In a widely discussed paper presented at multiple conferences over the summer, a team of researchers at the University of Chicago and the University of California, San Diego found “no evidence that annual security awareness training correlates with reduced phishing failures.” The researchers expected to see better performance from people who had recently completed the training, but their study found no significant connection between how recently a user completed a phishing training and how well they performed on a phishing test.

“Annual awareness training is not providing meaningful new knowledge or education to users,” said Grant Ho, an assistant professor of computer science at the University of Chicago and one of the study’s authors.

Ho and his co-authors wrote that the cybersecurity community “should re-examine whether such training, as delivered today, provides meaningful security benefits.”

There are equally serious problems with how remedial lessons are assigned. 

For one thing, the lessons are presented only to people who fail a test, meaning that they exclude others who might be susceptible to future failure. “This design implicitly assumes that users who do not fall for one phishing lure do not need training to protect against future attacks,” Ho and his co-authors wrote. “Unfortunately, our results show that the majority of users at our organization will eventually fall for a simulated phishing attack given enough time.” Because embedded phishing lessons don’t reach everyone who needs to see them, the researchers said, they are an inefficient way of educating people.

Other research casts doubt on the importance of immediately presenting failing users with information about how to pass future tests. In a study published in late 2024, researchers at ETH Zurich found that “informing employees about the exercise and directing them to training material the day after the incident … seems to be as effective as ‘immediate’ embedded training.” In other words, there is no need to confront people right after they fail.



Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.