Skip to main content
Daniel J Glover
Back to Blog

Building a Cybersecurity Culture That Works

10 min read
Article overview
Written by Daniel J Glover

Practical perspective from an IT leader working across operations, security, automation, and change.

Published 25 February 2026

10 minute read with practical, decision-oriented guidance.

Best suited for

Leaders and operators looking for concise, actionable takeaways.

Every IT leader I have worked with has the same complaint: "We run the training, people pass the quiz, and then click the phishing link the following week."

Building a cybersecurity culture is not about compliance checkboxes or annual e-learning modules. It is about fundamentally shifting how your organisation thinks about risk. The difference between organisations that suffer catastrophic breaches and those that catch threats early almost always comes down to culture, not technology.

This guide shares practical, battle-tested strategies for building a cybersecurity culture that changes behaviour, not just awareness scores.


Why Most Security Awareness Programmes Fail

Traditional security awareness training follows a predictable pattern. Once a year, employees sit through a presentation or click through an online module. They learn about password hygiene, phishing red flags, and data classification. They pass a quiz. Then nothing changes.

The problem is not the content. It is the approach. Annual training treats cybersecurity as an event rather than a habit. Behavioural science tells us that one-off interventions rarely produce lasting change. You would not expect a single gym session to make someone fit, yet we expect a single training session to make someone security-conscious.

Research from the SANS Institute consistently shows that organisations with mature security cultures experience 70% fewer security incidents than those relying on compliance-driven training alone. The difference is not budget or tools. It is sustained, embedded, culturally reinforced behaviour.

The Three Failure Modes

From my experience leading IT teams, security awareness programmes typically fail in one of three ways:

  1. The compliance trap - Training exists solely to satisfy audit requirements. Nobody measures whether behaviour actually changes.
  2. The fear approach - Security teams use scare tactics and punishment. Employees learn to hide mistakes instead of reporting them.
  3. The technology fallacy - Leadership assumes tools will compensate for human error. They invest in email filtering but neglect the human layer.

Each of these creates a false sense of security. The organisation believes it has addressed the human element when, in reality, it has simply documented that it tried.


What a Strong Cybersecurity Culture Looks Like

A genuine cybersecurity culture has observable characteristics. You can walk into an organisation and sense it within days.

People report incidents without fear. In a healthy security culture, employees flag suspicious emails, admit to clicking dodgy links, and ask questions about unfamiliar processes. There is no shame in making a mistake. The shame is in hiding one.

Security is part of business decisions. When launching a new product or onboarding a new vendor, security considerations are raised naturally, not bolted on as an afterthought. Project managers ask about data flows. Marketing teams question third-party tracking scripts.

Language matters. Security teams talk about risk in business terms, not technical jargon. They say "this could cost us three days of revenue" rather than "the CVE has a CVSS score of 9.1." Communication bridges the gap between technical reality and business impact.

Leaders model the behaviour. When the CEO uses multi-factor authentication, when directors challenge suspicious requests, when the board asks informed questions about cyber risk, it signals that security matters at every level.


A Practical Framework for Culture Change

Building cybersecurity culture is a long game. You will not transform an organisation in a quarter. But you can make measurable progress with a structured approach. Here is the framework I have used across multiple organisations.

1. Measure Your Starting Point

Before changing anything, understand where you are. Run an anonymous survey measuring:

  • How comfortable employees feel reporting security incidents
  • Whether they can identify common threats (phishing, social engineering, suspicious USB devices)
  • Their perception of the security team (helpful partner or bureaucratic blocker?)
  • How often they encounter security guidance in their daily work

This baseline gives you something concrete to improve against. Without it, you are guessing.

2. Make Reporting Safe and Simple

The single most impactful change you can make is removing barriers to incident reporting. If someone clicks a phishing link and is afraid to tell anyone, you have lost your most valuable detection mechanism: the human sensor.

Implement a one-click reporting button in your email client. Create a dedicated Slack or Teams channel for security questions. And critically, publicly thank people who report incidents. "Sarah in finance spotted a sophisticated phishing attempt this morning and reported it within minutes. That is exactly what we need" goes further than any training module.

I have seen organisations reduce their average incident detection time by over 60% simply by making reporting psychologically safe.

3. Embed Security Into Daily Workflows

Security awareness should not be a separate activity. It should be woven into existing processes:

  • Onboarding: New starters get a 30-minute security orientation on day one, covering real examples of attacks that targeted the organisation (anonymised if needed).
  • Team meetings: A two-minute "security moment" at the start of monthly team meetings. Share a recent phishing attempt, a news story about a breach, or a quick tip.
  • Project kickoffs: Include a security checklist in project templates. Not a 50-page risk assessment, but five practical questions about data handling and access control.
  • Performance reviews: Include security awareness as a competency. Not as a stick, but as recognition that security-conscious behaviour is valued.

The goal is frequency and relevance. Short, regular touchpoints beat long, infrequent sessions every time.

4. Use Phishing Simulations Intelligently

Phishing simulations are valuable when done correctly and counterproductive when done badly.

Do: Run monthly simulations with increasing sophistication. Track improvement over time. Use failures as coaching opportunities, not punishment. Share aggregate results transparently.

Do not: Name and shame individuals who fail. Use simulations that are deliberately misleading to the point of being unfair. Run simulations without follow-up education for those who click.

The best approach I have seen combines simulation with immediate, constructive feedback. When someone clicks a simulated phish, they see a brief, friendly explanation of what they missed and one specific thing to look for next time. No alarm bells. No disciplinary notes. Just learning.

Over 12 months of well-run simulations, most organisations see click rates drop from 25-30% to under 5%.

5. Empower Security Champions

You cannot scale culture change through the security team alone. You need allies embedded across the business.

Identify volunteers from each department who are interested in security. Give them additional training, access to threat intelligence briefings, and a direct line to the security team. These security champions become the local experts who answer questions, spot risks, and reinforce good practice within their teams.

The champion model works because people are more likely to listen to a trusted colleague than to someone from a central IT function they rarely interact with. A security champion in the sales team who says "watch out for this invoice scam doing the rounds" carries more weight than an email from IT.

6. Communicate Like a Human

The fastest way to kill a cybersecurity culture is to communicate like a compliance department. Nobody reads 2,000-word security policies. Nobody remembers 47 rules for password creation.

Instead:

  • Tell stories. "Last month, a company similar to ours lost two million pounds because someone approved a payment based on a spoofed email. Here is how to spot one."
  • Keep it short. Weekly security tips should be three sentences maximum.
  • Use humour. A funny poster in the kitchen about password reuse will do more than a formal policy document.
  • Be visual. Infographics, short videos, and memes are more shareable and memorable than text-heavy guidance.

The UK's National Cyber Security Centre produces excellent, plain-English guidance that serves as a model for how to communicate security concepts without drowning people in jargon.


Measuring Cultural Change

You cannot manage what you do not measure. Track these indicators quarterly:

  • Phishing simulation click rates - Your most direct behavioural measure
  • Incident reporting volume - An increase is good (it means people are reporting more, not that more incidents are happening)
  • Time to report - How quickly do employees flag suspicious activity?
  • Survey scores - Repeat your baseline survey annually to track perception changes
  • Shadow IT discovery rate - Are employees proactively disclosing unapproved tools?

Present these metrics to the board alongside traditional security metrics. Executives respond well to trend lines showing cultural improvement. It demonstrates that the organisation is building resilience, not just buying tools.

For a deeper look at how the CISO role is evolving to encompass this kind of strategic work, the shift from technical guardian to business partner is directly relevant here.


The Role of Leadership

Culture flows downhill. If the executive team treats security as someone else's problem, the rest of the organisation will follow suit.

IT leaders must secure visible executive sponsorship for cybersecurity culture initiatives. This means:

  • Board-level reporting on security culture metrics alongside financial and operational metrics
  • Executive participation in security exercises and tabletop scenarios
  • Budget allocation that reflects the priority placed on human factors, not just technology
  • Consistent messaging that security is everyone's responsibility, backed by action

When I have seen cybersecurity culture programmes fail, the root cause is almost always lack of sustained leadership commitment. The initial enthusiasm fades, the budget gets redirected, and the programme quietly dies.

The same principle applies to Zero Trust Architecture, where success depends on organisational buy-in rather than technology procurement.


Quick Wins to Start This Week

If you are reading this and thinking "where do I even begin?", here are five actions you can take immediately:

  1. Set up a one-click phishing report button in your email client. Most platforms (Outlook, Gmail) support this natively or through add-ons.
  2. Run a baseline phishing simulation to understand your current click rate. Services like KnowBe4, Proofpoint, or even open-source tools like GoPhish make this straightforward.
  3. Create a security tips channel in your messaging platform. Post one tip per week. Keep it casual.
  4. Add a security moment to your next team meeting. Share a recent real-world breach story and ask "could this happen to us?"
  5. Thank someone publicly for reporting a security concern. Set the tone that reporting is valued.

None of these require budget approval. None require new technology. They require intent, consistency, and a genuine belief that your people are your strongest defence, not your weakest link.


The Long Game

Building a cybersecurity culture is not a project with a start and end date. It is an ongoing commitment that evolves as threats change, as your organisation grows, and as new technologies create new risks.

The organisations that get this right treat cybersecurity culture as a core business capability, not an IT initiative. They invest in it continuously, measure it rigorously, and celebrate it visibly.

Your security tools will stop a significant proportion of threats. But the threats that get through, the sophisticated social engineering attacks, the carefully crafted phishing campaigns, the insider risks, these are the ones where culture is your last and best line of defence.

Start small. Be consistent. Measure everything. And remember: the goal is not perfect security. The goal is an organisation where everyone understands their role in protecting it.

That is a cybersecurity culture that actually works.

Share this post

About the author

DG

Daniel J Glover

IT Leader with experience spanning IT management, compliance, development, automation, AI, and project management. I write about technology, leadership, and building better systems.

Continue exploring

Keep building context around this topic

Jump to closely related posts and topic hubs to deepen understanding and discover connected ideas faster.

Browse all articles

Let's Work Together

Need expert IT consulting? Let's discuss how I can help your organisation.

Get in Touch