Security awareness trainings can be effective when designed as a long-term, interactive program with short, repeated learning units rather than a single annual lecture. Misconceptions—such as trainings shifting responsibility onto users or being inherently deceptive or impractical—are refuted, and the article highlights the need for a systemic approach to reduce email-based incidents. #GDATA #phishing-email
Keypoints
- Many major data breaches start with a single email, underscoring the importance of user-focused defenses.
- Responsibility for IT security is shared across users, management, and IT; “human error” is usually a symptom of systemic issues.
- Phishing simulations and trainings must be communicated and executed in a fear-free way to avoid deceiving or shaming employees.
- Annual, lecture-style trainings are largely ineffective; short, repeated, interactive learning units and practice produce measurable long-term improvement.
- Positive reinforcement, gamification, and integrating training into the work environment increase engagement and retention.
- G DATA’s approach emphasizes microlearning, repetition, interactivity, and long-term program design as alternatives to didactically outdated formats.
MITRE Techniques
- [T1566 ] Phishing – Use of malicious email as the initial delivery vector; (‘an email that should never have been opened.’)
- [T1204 ] User Execution – Actions by users that trigger compromise, such as clicking malicious links; (‘Employee X clicked on a malicious link.’)
Indicators of Compromise
- [None ] The article does not mention specific IOCs such as IP addresses, file hashes, domains, or filenames – no examples provided.
Read more: https://www.gdatasoftware.com/blog/2025/11/38304-six-misconceptions-about-awareness-trainings