Stop Training Your Employees. Start Changing Their Behavior.
cybersecuritybehavior-change

Stop Training Your Employees. Start Changing Their Behavior.

Quentin F. Quentin F. ·

The Story of Two Coffee Shops

Coffee Shop A invested in the best security tools money could buy: enterprise firewall, premium antivirus, advanced email filtering. They also ran annual security training, and every employee passed the quiz.

When Sarah, the cashier, got a phone call from someone claiming to be “IT support” asking for the WiFi password, she gave it out. Attackers used the access to steal customer credit card data.

Sarah had scored 92% on her security quiz two months earlier. She could define phishing, list red flags, and explain why credentials shouldn’t be shared. But in the moment, on a busy Tuesday with a line of customers and a caller who sounded official and urgent, her trained knowledge didn’t activate.

Coffee Shop B had basic security tools but invested in continuous behavioral nudging. When Mike, the barista, got the same fake “IT support” call, he said “Let me call you back” and checked with his manager. They caught the scam.

Mike hadn’t scored better on any quiz than Sarah. The difference was that his “verification reflex” had been reinforced through weekly micro-quizzes in the team’s Slack channel for the past three months. The correct response wasn’t something he had to recall. It was automatic.

The “Human Firewall” Concept Is Right. The Execution Is Wrong.

The Right Insight

The security industry correctly identified the problem: 83% of successful cyber attacks involve a human element. Technology alone can’t stop an employee from clicking, sharing, or approving something they shouldn’t.

The proposed solution was the “human firewall”: train employees to recognize and resist attacks, turning your team into a living, breathing security layer.

The insight is correct. The execution - training-based approaches - has largely failed.

The Wrong Execution

Here’s what the “human firewall” approach looks like in most organizations:

  1. Annual security awareness training in an LMS
  2. Phishing simulations a few times a year
  3. Quiz scores and completion rates as success metrics
  4. Maybe a poster in the break room

And here’s what the data shows:

  • Click rates on phishing simulations drop briefly after training, then return to baseline within 60-90 days
  • 78% of employees pass security quizzes but still engage in risky behaviors
  • Annual training produces a measurable behavior change of 2-4% on average
  • The forgetting curve erases 90% of training content within one week

The industry has been prescribing more of the same medicine: more training hours, more quiz questions, more simulation frequency. The fundamental approach hasn’t changed. And the results haven’t either.

Why Training Doesn’t Produce Behavior Change

The Knowledge-Behavior Gap

This is the central problem. Knowing something and doing something are governed by different cognitive systems.

Declarative knowledge (what training teaches): “I should verify unexpected requests through a second channel.”

Procedural behavior (what matters in the moment): Automatically reaching for the phone to verify when an unusual email arrives.

Training builds declarative knowledge. It does not build procedural behavior. The gap between them is where every social engineering attack lives.

The Forgetting Curve

Hermann Ebbinghaus demonstrated that without reinforcement:

  • 50% of new information is forgotten within 1 hour
  • 70% within 24 hours
  • 90% within 1 week

Annual training is a single data point on the forgetting curve. By the time an employee faces a real attack weeks or months later, the specific red flags, procedures, and responses have faded from active memory.

What remains is a vague sense that “I should be careful,” which is almost useless against a well-crafted social engineering attempt.

The Context Transfer Problem

Training happens in a training context: a quiet room, a computer screen, a quiz format where the employee knows they’re being tested. The red flags are obvious because the employee is looking for them.

Attacks happen in a work context: a busy inbox, time pressure, multiple tasks competing for attention, a request that feels routine. The employee isn’t looking for red flags because they’re not in “training mode.”

Training ContextWork Context
Quiet, focused, expecting red flagsBusy inbox, time pressure, multitasking
Employee knows they’re being testedRequest feels routine and legitimate
Red flags are obvious by designNo obvious signals to trigger suspicion
Correct answer earns a quiz scoreCorrect response requires overriding habit

Cognitive science calls this the “transfer problem.” Skills learned in one context don’t automatically transfer to a different context.

The Motivation Problem

Annual training doesn’t motivate behavior change. It motivates compliance: click through the slides, pass the quiz, get back to work.

This isn’t because employees are lazy. It’s because the training format doesn’t engage the psychological mechanisms that drive real behavior change: immediate feedback, social reinforcement, contextual relevance, and incremental habit building.

What Behavioral Science Says Actually Works

Principle 1: Observe Real Behavior, Not Self-Reported Knowledge

What training measures: Whether employees can identify risks in a controlled environment.

What behavioral observation measures: Whether employees actually follow security policies in their daily work.

SaaS audit tools can observe (non-invasively) the patterns that matter:

  • Credential sharing in chat tools
  • Email-handling patterns (verification vs. automatic opening)
  • Data sharing outside approved channels
  • MFA response patterns
  • Shadow IT adoption

When you can see the real behaviors, you can target interventions at the actual problems, not the imagined ones.

Principle 2: Nudge at the Point of Decision

A nudge delivered at the moment of behavior is exponentially more effective than training delivered months earlier.

What this looks like in practice:

  • When someone is about to share credentials in Slack: “Your security policy prohibits credential sharing in messaging tools. Use [approved method] instead.”
  • When a finance team member receives a payment change email: “Your PSSI requires phone verification for account changes. Call the vendor at the number in your database.”
  • When someone hasn’t updated their password manager in 30 days: “Quick reminder: your password manager keeps your accounts safe. Spend 60 seconds updating any recently changed passwords.”

These nudges are:

  • Contextual: Delivered where the behavior happens (Slack, Teams)
  • Immediate: Appear at the moment of decision, not weeks later
  • Specific: Reference your actual security policy (PSSI)
  • Actionable: Tell people what to do, not just what not to do
  • Brief: 10-15 seconds, not 30-60 minutes

Principle 3: Use Spaced Repetition to Build Automatic Responses

The forgetting curve is a problem if you train once. It’s a tool if you reinforce continuously.

Spaced repetition delivers small, targeted reinforcements at optimal intervals:

  • Day 1: Initial exposure to a security concept or procedure
  • Day 3: First reinforcement (micro-quiz in Slack/Teams)
  • Day 7: Second reinforcement
  • Day 14: Third reinforcement
  • Day 30+: Maintenance reinforcement

Each reinforcement takes 30 seconds. Over time, the correct responses become automatic - part of the employee’s procedural behavior, not just their declarative knowledge.

Research shows spaced repetition produces 80-90% retention, compared to 10-20% from single training sessions. This isn’t a marginal improvement. It’s an order-of-magnitude difference.

Principle 4: Anchor Everything to Your PSSI

Generic security training teaches generic responses. But your organization has specific policies, specific tools, and specific procedures.

When nudges and quizzes are generated from your actual security policy (PSSI):

  • Guidance is immediately actionable: “Our policy (Section 4.2) requires payment changes to be verified by phone”
  • Employees learn the real procedures, not hypothetical best practices
  • Compliance is built into daily behavior, not bolted on as an afterthought
  • Auditors can trace a direct line from policy to behavioral data

Principle 5: Deliver Where People Work, Not Where They Train

Your employees live in Slack and Teams. That’s where decisions are made, files are shared, and security-relevant behaviors happen.

Security guidance delivered in an LMS requires: Employee stops working, opens a separate platform, processes information in a training context, closes the platform, and somehow transfers the learning to a completely different context.

Security guidance delivered in Slack/Teams: Appears in the workflow, takes 30 seconds, is immediately relevant, no context switch required.

The engagement difference is measurable: Slack/Teams nudges see 4-6x higher interaction rates than LMS modules.

Building Behavioral Security (Not Another Training Program)

Week 1: Observe Your Reality

Deploy behavioral observation:

  • Connect SaaS audit tools to your workplace platforms
  • Establish baseline behavioral metrics: credential sharing frequency, email verification rates, MFA response patterns, data handling practices
  • Identify the top 3-5 behavioral risks specific to your organization

Map behaviors to your PSSI:

  • Which policy sections are being violated most often?
  • Which teams have the highest-risk behavioral patterns?
  • Where is the gap between policy and practice widest?

Week 2: Launch Targeted Nudges

Start with your #1 behavioral risk:

  • If it’s credential sharing: deploy nudges when credentials appear in chat
  • If it’s email verification: deploy nudges when risky email patterns are detected
  • If it’s data handling: deploy nudges when sensitive data is shared outside approved channels

Nudge design principles:

  • Helpful, not punitive
  • Specific to your PSSI
  • Actionable (tells people what to do instead)
  • Brief (under 15 seconds to process)

Week 3: Build the Reinforcement Loop

Launch spaced-repetition micro-quizzes:

  • 30-second scenarios delivered in Slack/Teams
  • Tied to your top behavioral risks and PSSI sections
  • Scheduled at optimal intervals: Day 1, 3, 7, 14, then monthly
  • Track completion, correctness, and engagement

Start the feedback cycle:

  • Share anonymized behavioral trends with teams
  • Celebrate improvements: “Our team’s email verification rate improved by 30% this month”
  • Identify persistent gaps for additional targeted nudges

Week 4: Measure What Matters

Track behavioral metrics, not training metrics:

  • Credential-sharing incidents per week (trending down?)
  • Email verification compliance rate (trending up?)
  • MFA denial of unexpected prompts (trending up?)
  • Time-to-report for suspicious communications (trending down?)
  • Reporting volume (trending up means people are more vigilant)

Compare to your Week 1 baseline. This is the data that tells you whether your security posture is actually improving, not whether people passed a quiz.

Dealing with Skeptics

”Our employees already know this stuff.”

That’s the point. They know it. They don’t do it. Knowledge without behavioral reinforcement produces quiz scores, not security outcomes. Ask the skeptic: “If our employees know this, why does our SaaS audit show credential sharing 15 times per week?"

"We already do phishing simulations.”

Phishing simulations test whether people can spot a specific fake email. They don’t build the behavioral reflexes that activate regardless of how the attack looks. Simulations are one data point. Continuous behavioral nudging is the program that changes the underlying habits.

”This sounds like surveillance.”

SaaS audits observe behavioral patterns, not content. The system knows that credentials were shared in a chat channel, not what was said in the conversation. It’s the same principle as a building access log.

More importantly, the output is helpful guidance, not punishment. Employees who understand that the system helps them follow the policies they already agreed to generally accept it quickly.

”Training is required for compliance.”

True. Many frameworks require “security awareness training.” But the frameworks also require that employees actually follow the policies.

Behavioral nudging provides evidence of both: that employees received guidance (the nudges) and that their behavior changed (the metrics). This is stronger compliance evidence than a training completion certificate.

Measuring Success: The Metrics That Matter

Stop TrackingStart Tracking
Training completion ratesBehavioral compliance rate
Quiz scoresNudge response rate
Number of training hoursIncident precursor reduction
LMS engagement metricsReporting rate and time-to-report

These metrics tell you whether your people are actually more secure, not whether they completed an administrative requirement.

The Culture Shift

The most important outcome of behavioral nudging isn’t any single metric. It’s the cultural shift from “security is an annual training obligation” to “security is part of how we work every day.”

When nudges and micro-quizzes are part of the daily Slack/Teams experience:

  • Security becomes a normal topic of conversation
  • People start asking each other “did you verify that?”
  • Reporting suspicious things becomes socially encouraged, not awkward
  • New employees absorb security behaviors from the environment, not just from a training module

This is the real human firewall: not a team that passed a quiz, but a team whose daily behaviors are aligned with your security policy, reinforced continuously, and measured objectively.

The Bottom Line

Stop training your employees. Start changing their behavior.

Training produces knowledge. Knowledge doesn’t produce behavior change. The forgetting curve, the context transfer problem, and the knowledge-behavior gap guarantee that annual training will never produce the security outcomes the industry has been promising for decades.

What works:

  1. Observe real behaviors through SaaS audits
  2. Nudge at the point of decision, in Slack and Teams
  3. Reinforce with spaced repetition, timed to the forgetting curve
  4. Anchor to your actual security policy (PSSI)
  5. Measure behavior change, not quiz scores

Your employees aren’t your weakest link. They’re your most under-supported one. Give them the right guidance, at the right time, in the right place, and they become the strongest layer of your defense.

Sources


Ready to stop training and start changing behaviors? Contact EnGarde and let us show you how behavioral nudges produce the security outcomes that training never could.

Quentin F.

Quentin F.

CEO & Founder, EnGarde

Building behavior-centered cybersecurity. Believes training doesn't work - real-time guidance does.

LinkedIn
← Back to all posts