{"id":183,"date":"2026-03-17T20:42:00","date_gmt":"2026-03-17T20:42:00","guid":{"rendered":"https:\/\/www.cardonet.co.uk\/insights\/?p=183"},"modified":"2026-03-13T16:13:21","modified_gmt":"2026-03-13T16:13:21","slug":"cyber-security-the-people-factor","status":"publish","type":"post","link":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/","title":{"rendered":"The\u00a0People\u00a0Factor: Why Technical Controls Fail Without Human Training\u00a0"},"content":{"rendered":"\n<p>What\u2019s&nbsp;the point in spending tens of thousands on security infrastructure, getting it all configured properly, running penetration tests which come back clean only to have, three months later, someone in accounts clicking on a fake invoice and compromising the entire network.&nbsp;<\/p>\n\n\n\n<p>I&#8217;ve been thinking about why this keeps happening, and I don&#8217;t think it&#8217;s actually a technology problem.&nbsp;<\/p>\n\n\n\n<p><strong>Technical security controls fail when&nbsp;organisational&nbsp;culture treats security as an IT problem rather than a business responsibility shared across all employees.<\/strong>&nbsp;The technology works&nbsp;&#8211;&nbsp;as long as&nbsp;people do what they need to.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The UK government&#8217;s latest data shows phishing attacks affected 85% of businesses that experienced security incidents<\/a>. But only 19% of UK businesses conduct regular staff training on cyber security.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>People Keep Clicking<\/strong>&nbsp;<\/h2>\n\n\n\n<p>We&nbsp;used to think the problem was that people&nbsp;weren&#8217;t&nbsp;paying attention. That if we just made the training more engaging or the warnings more visible,&nbsp;they&#8217;d&nbsp;stop falling for social engineering.&nbsp;We were&nbsp;wrong.&nbsp;<\/p>\n\n\n\n<p>Most security training still focuses on spotting spelling mistakes in emails and avoiding suspicious links. That&nbsp;may have&nbsp;worked in 2016&nbsp;but in&nbsp;2026, AI-generated phishing emails have perfect grammar, reference real projects&nbsp;you&#8217;re&nbsp;working on scraped from LinkedIn, and come from compromised legitimate accounts. The old tells&nbsp;don&#8217;t&nbsp;work anymore.&nbsp;<\/p>\n\n\n\n<p>Security&nbsp;training&nbsp;has to&nbsp;be more than&nbsp;compliance exercise teaching people to spot threats that barely exist anymore, more than an&nbsp;annual module about not clicking suspicious links. Meanwhile, attackers are using AI to generate personalized spear-phishing campaigns at scale, creating deepfake audio for business email compromise, and exploiting supply chain vulnerabilities that&nbsp;your team&nbsp;don&#8217;t&nbsp;even know exist.&nbsp;<\/p>\n\n\n\n<p>Your team&nbsp;don&#8217;t&nbsp;resist security because&nbsp;they&#8217;re&nbsp;careless. They resist because training is abstract, outdated, and disconnected from the actual threat landscape.&nbsp;<\/p>\n\n\n\n<p>Controls without context feel like obstacles, not protection.&nbsp;<\/p>\n\n\n\n<p>Security policies get written by technical teams who understand zero trust architecture but&nbsp;don&#8217;t&nbsp;understand how people work. A restaurant manager closing at midnight after a 14-hour shift will approve a payment request on their phone if it looks legitimate &#8211; even if it bypasses your carefully designed approval workflows. Your manager had no way to know&nbsp;that the supplier&#8217;s email was compromised weeks ago.&nbsp;<\/p>\n\n\n\n<p>Security policies that require cognitive effort during high-stress moments&nbsp;risk&nbsp;getting&nbsp;bypassed. We can call that user&nbsp;error&nbsp;or we can recognize&nbsp;that&nbsp;it\u2019s&nbsp;a feature of the system rather than a glitch.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.mimecast.com\/blog\/verizon-60-of-breaches-involve-human-error\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Verizon&#8217;s 2025 Data Breach Investigations Report found that 60% of breaches involve a human element<\/a>\u202f- errors, social engineering,&nbsp;or&nbsp;credential misuse. That percentage&nbsp;hasn&#8217;t&nbsp;improved despite AI-powered security tools,&nbsp;passwordless&nbsp;authentication, and zero trust implementations.&nbsp;&nbsp;<\/p>\n\n\n\n<p>The defensive technology has advanced&nbsp;but the&nbsp;offensive technology has advanced faster. And humans are still the gap.&nbsp;<\/p>\n\n\n\n<p>We&#8217;ve&nbsp;tried changing behaviour through policy documents and annual training modules teaching outdated threat recognition. We&nbsp;haven&#8217;t&nbsp;tried helping people understand that AI has fundamentally changed the threat landscape, that the old rules about &#8220;suspicious emails have spelling mistakes&#8221;&nbsp;don&#8217;t&nbsp;apply anymore, and that verification processes exist because deepfakes are now indistinguishable from reality.&nbsp;<\/p>\n\n\n\n<p>Manufacturing learned in the 1980s that you&nbsp;can&#8217;t&nbsp;make workplaces safe just by posting safety rules and expecting compliance. The companies that reduced workplace&nbsp;injuries built&nbsp;safety into the workflow itself. We&nbsp;have to&nbsp;stop&nbsp;trying to bolt 2026 security controls onto workflows designed for 2016 threats.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The Thing Nobody Says Out Loud About Cyber Security<\/strong>\u00a0<\/h2>\n\n\n\n<p>Cyber Security friction slows workflows. Humans are naturally lazy and will, by default,\u00a0optimize\u00a0for ease of execution. If you\u00a0won&#8217;t\u00a0acknowledge this tension, you\u00a0can&#8217;t\u00a0address it.\u00a0<\/p>\n\n\n\n<p>A salesperson trying to close a deal before month-end may share a confidential proposal via personal Gmail if the approved file transfer system takes six clicks and requires IT approval. A startup founder racing toward a funding deadline will reuse passwords across platforms because remembering unique credentials&nbsp;isn&#8217;t&nbsp;the best use of her cognitive energy.&nbsp;<\/p>\n\n\n\n<p>Take, for example, a boutique hotel group with four properties which installed sophisticated access controls requiring multi-factor authentication (MFA) for everything. Excellent&nbsp;security in&nbsp;theory.&nbsp;<\/p>\n\n\n\n<p>But if authentication adds time over busy periods, before long staff will develop workarounds through shared credentials, sessions left open on unattended terminals, and even using the general manager&#8217;s login when guests are waiting because hers doesn\u2019t need the second authentication step (for some reason nobody understands).&nbsp;&nbsp;<\/p>\n\n\n\n<p>Designing cyber security that aligns with workflow rather than disrupting it means asking what\u00a0your team\u00a0actually\u00a0do\u00a0all day. Where are the friction points? How do we create protection that feels invisible?\u00a0<\/p>\n\n\n\n<p>Businesses involving front-line staff in policy design before implementation get policies that&nbsp;actually get&nbsp;followed because they make operational sense.&nbsp;<\/p>\n\n\n\n<p>Cyber Security policies feel like expressions of institutional distrust. Tell someone their email will be\u00a0monitored, web browsing logged, file transfers restricted. The implicit message is &#8220;we don&#8217;t trust you.&#8221; People view security as adversarial. They look for ways around restrictions because the restrictions feel personal.\u00a0<\/p>\n\n\n\n<p>While there are legitimate reasons to&nbsp;monitor&nbsp;certain activities, and genuine insider threats exist, if&nbsp;your security model assumes every&nbsp;team member&nbsp;is potentially malicious, what kind of culture&nbsp;and SOP&nbsp;are you creating? And what does that cost you in terms of good&nbsp;people&nbsp;who resent being treated like threats?&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How&nbsp;To&nbsp;Get It Right<\/strong>&nbsp;<\/h2>\n\n\n\n<p>Leadership must own cyber security, not delegate it to IT. If your CEO treats security as a cost\u00a0centre,\u00a0you&#8217;re\u00a0stuck until a breach forces the conversation.\u00a0<\/p>\n\n\n\n<p>Training that works:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hotels: 3-minute case studies about credential compromises at competitors&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Restaurants: 5-minute briefings on POS malware mechanics&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Startups: monthly phishing simulations with immediate coaching&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>People remember training delivered in their work context when they need it.&nbsp;<\/p>\n\n\n\n<p><strong>Security champions make&nbsp;the&nbsp;difference.<\/strong>&nbsp;Identify&nbsp;advocates in each department who understand both security and operational reality. Front office champions know guest service pressures. Kitchen champions understand how chefs use tablets. They spot workarounds caused by poorly designed controls.&nbsp;<\/p>\n\n\n\n<p>Involve champions in security design, not just rollout. They catch workflow problems before deployment.&nbsp;<\/p>\n\n\n\n<p><strong>Celebrate reporting.<\/strong>&nbsp;When someone reports suspicious activity &#8211; even false alarms &#8211; thank them publicly. When someone admits clicking a phishing link, respond &#8220;thank you for reporting quickly,&#8221; not with discipline.&nbsp;<\/p>\n\n\n\n<p>Punitive security drives incidents underground.&nbsp;Your team&nbsp;hide&nbsp;breaches for days fearing blame.&nbsp;&nbsp;<\/p>\n\n\n\n<p>You can also track behavioral metrics:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>How many staff report suspicious activity (increasing = awareness rising, not threats increasing)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Escalation speed from detection to security team&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing simulation results (vary formats or people learn your tests)&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Security discussions in team meetings without IT prompting&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>New hires asking security questions unprompted&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These show whether people think differently.&nbsp;<\/p>\n\n\n\n<p>Remember that &#8220;97% completed training&#8221; can mean that 97% clicked through to stop notifications. Nothing more.&nbsp;<\/p>\n\n\n\n<p>Companies that train\u00a0their team\u00a0to recognize social engineering also train them well in customer service, quality control, and process adherence. The discipline is transferable. If\u00a0you&#8217;ve\u00a0built a culture where people pay attention to details, question things that seem wrong, and report problems\u00a0immediately,\u00a0you&#8217;ve\u00a0built something valuable that extends beyond security.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-1024x683.png\" alt=\"\" class=\"wp-image-187\" srcset=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-1024x683.png 1024w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-300x200.png 300w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-768x512.png 768w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-280x187.png 280w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet-1170x780.png 1170w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-building-a-robust-security-culture-cardonet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What To Do Next<\/strong>&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">UK businesses experienced approximately 8.58 million cyber crimes in the past year<\/a>. If&nbsp;you&#8217;re&nbsp;reading this because your&nbsp;organisation&nbsp;experienced a security incident involving human error,&nbsp;you&#8217;re&nbsp;not alone.&nbsp;<\/p>\n\n\n\n<p>Start by assessing your current security culture &#8211; not your documented policies, but how people actually behave.&nbsp;Are&nbsp;your team&nbsp;comfortable reporting suspicious activity, or do they fear looking foolish? Do senior managers follow the same protocols they expect from everyone else, or are there special exemptions for executives? Is security discussed in team meetings, or only after incidents?&nbsp;<\/p>\n\n\n\n<p>Be honest about what you find.&nbsp;The gap between&nbsp;documented&nbsp;and&nbsp;actual&nbsp;behaviour&nbsp;tells you where the work needs to happen.&nbsp;<\/p>\n\n\n\n<p>Implement regular training that connects to people&#8217;s actual work. A monthly 10-minute team discussion about recent threats in your sector, combined with quarterly phishing simulations and immediate coaching, will outperform annual compliance training by orders of magnitude.&nbsp;<\/p>\n\n\n\n<p>Consider\u00a0engaging\u00a0an external partner to conduct a security culture assessment alongside your technical audit.\u00a0Discover more about our suggested <a href=\"https:\/\/www.cardonet.com\/cyber-security-journey.php\"><strong>Cyber Security Journey<\/strong><\/a> here.\u00a0<\/p>\n\n\n\n<p>At&nbsp;Cardonet, we help&nbsp;organisations&nbsp;understand not just where technical controls have gaps, but where culture creates vulnerability. Sometimes an external voice helps surface things people already know but&nbsp;haven&#8217;t&nbsp;felt able to discuss internally.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-1024x683.png\" alt=\"\" class=\"wp-image-186\" srcset=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-1024x683.png 1024w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-300x200.png 300w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-768x512.png 768w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-280x187.png 280w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet-1170x780.png 1170w, https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/assess-your-cyber-security-culture-cardonet.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>FAQs: Security Culture in 2026<\/strong>&nbsp;<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How much should we budget for security awareness training that covers modern threats?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>This depends \u2013 speak to us for a quotation. The&nbsp;real cost&nbsp;is management time: 30 minutes monthly for team discussions about emerging threats, immediate response to reported incidents, visible leadership engagement. Organizations treating this as annual compliance get no results. Those treating it as ongoing adaptation to evolving threats see behavioral change. Measure prevented incidents, not completion rates.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What if employees resist modern security requirements because&nbsp;they&#8217;re&nbsp;disruptive?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>You&nbsp;haven&#8217;t&nbsp;explained why 2026 security is necessary. Modern security &#8211; zero trust, continuous verification, conditional access &#8211; is more disruptive than perimeter-based 2016 security. Resistance means&nbsp;you&#8217;ve&nbsp;implemented controls without explaining&nbsp;what&#8217;s&nbsp;changed about threats. Involve operational teams in understanding modern attack vectors and designing implementations that&nbsp;maintain&nbsp;protection while minimizing workflow disruption. Security designed with people who understand both threats and operations&nbsp;doesn&#8217;t&nbsp;get bypassed.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Should we punish employees who fall for AI-generated social engineering?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>No. Sophisticated AI-generated attacks fool security-aware people regularly. Punishment drives incidents underground. The goal is immediate reporting of suspected deepfakes, AI-generated fraud, supply chain anomalies &#8211; even when people&nbsp;aren&#8217;t&nbsp;certain. The moment someone fears discipline for falling for sophisticated social engineering,&nbsp;they&#8217;ll&nbsp;hide it, wasting crucial response time. Thank people for reporting promptly regardless of&nbsp;outcome. Even experts get fooled by 2026 threats.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How do we measure whether security culture is keeping pace with evolving threats?<\/strong>&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Track behavior against current threats, not static training completion.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Monitor:&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>staff reporting suspected AI communications, deepfakes, supply chain anomalies (increasing reports = rising awareness, not more threats);&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>whether people verify unusual requests through alternate channels unprompted (stops most AI fraud);&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>security discussions referencing recent threats in team meetings; new hires asking about modern threats without prompting.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>These show whether awareness evolves with threats.&nbsp;Completion&nbsp;metrics for static training modules&nbsp;are&nbsp;meaningless.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>We&#8217;re&nbsp;a small business &#8211; can we afford security culture that addresses 2026 threats?<\/strong>&nbsp;<\/h3>\n\n\n\n<p>You&nbsp;can&#8217;t&nbsp;afford not to. Small businesses face&nbsp;the same&nbsp;sophisticated threats&nbsp;as big businesses&nbsp;&#8211; AI phishing, ransomware, supply chain attacks&nbsp;\u2013&nbsp;but have&nbsp;less technology to&nbsp;compensate. You&nbsp;can&#8217;t&nbsp;match enterprise security budgets,&nbsp;but you can echo&nbsp;it culturally with&nbsp;appropriate tools.&nbsp;You need&nbsp;monthly discussions about sector-specific threats, visible leadership engagement,&nbsp;and&nbsp;simple reporting processes&nbsp;alongside&nbsp;cloud-native security tools at&nbsp;appropriate&nbsp;scale.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What\u2019s&nbsp;the point in spending tens of thousands on security infrastructure, getting it all configured properly, running penetration tests which come back clean only to have, three months later, someone in accounts clicking on a fake invoice and compromising the entire network.&nbsp; I&#8217;ve been thinking about why this keeps happening, and I don&#8217;t think it&#8217;s actually<\/p>\n","protected":false},"author":3,"featured_media":184,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"class_list":["post-183","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-ssecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Security Training Fails | Human Factors in Cybersecurity<\/title>\n<meta name=\"description\" content=\"85% of UK breaches involve human error, yet only 19% of businesses train their team properly. Here&#039;s why technical controls fail without security culture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Security Training Fails | Human Factors in Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"85% of UK breaches involve human error, yet only 19% of businesses train their team properly. Here&#039;s why technical controls fail without security culture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/\" \/>\n<meta property=\"og:site_name\" content=\"Insight\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cardonet\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T20:42:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"334\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viki Asimov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cardonetit\" \/>\n<meta name=\"twitter:site\" content=\"@cardonetit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viki Asimov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Security Training Fails | Human Factors in Cybersecurity","description":"85% of UK breaches involve human error, yet only 19% of businesses train their team properly. Here's why technical controls fail without security culture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/","og_locale":"en_GB","og_type":"article","og_title":"Why Security Training Fails | Human Factors in Cybersecurity","og_description":"85% of UK breaches involve human error, yet only 19% of businesses train their team properly. Here's why technical controls fail without security culture.","og_url":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/","og_site_name":"Insight","article_publisher":"https:\/\/www.facebook.com\/Cardonet","article_published_time":"2026-03-17T20:42:00+00:00","og_image":[{"width":600,"height":334,"url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png","type":"image\/png"}],"author":"Viki Asimov","twitter_card":"summary_large_image","twitter_creator":"@cardonetit","twitter_site":"@cardonetit","twitter_misc":{"Written by":"Viki Asimov","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#article","isPartOf":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/"},"author":{"name":"Viki Asimov","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/person\/36a7d06561738c35ed9474545767e727"},"headline":"The\u00a0People\u00a0Factor: Why Technical Controls Fail Without Human Training\u00a0","datePublished":"2026-03-17T20:42:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/"},"wordCount":1979,"commentCount":0,"publisher":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png","articleSection":["Cyber Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/","url":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/","name":"Why Security Training Fails | Human Factors in Cybersecurity","isPartOf":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#primaryimage"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png","datePublished":"2026-03-17T20:42:00+00:00","description":"85% of UK breaches involve human error, yet only 19% of businesses train their team properly. Here's why technical controls fail without security culture.","breadcrumb":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#primaryimage","url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png","contentUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2026\/03\/cyber-security-people-factor-why-technical-controls-fail-cardonet.png","width":600,"height":334,"caption":"cyber security people factor why technical controls fail"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cardonet.co.uk\/insights\/cyber-security-the-people-factor\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cardonet.co.uk\/insights\/"},{"@type":"ListItem","position":2,"name":"The\u00a0People\u00a0Factor: Why Technical Controls Fail Without Human Training\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.cardonet.co.uk\/insights\/#website","url":"https:\/\/www.cardonet.co.uk\/insights\/","name":"Insight","description":"IT Services from Cardonet","publisher":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cardonet.co.uk\/insights\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cardonet.co.uk\/insights\/#organization","name":"Cardonet IT Support","url":"https:\/\/www.cardonet.co.uk\/insights\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/logo\/image\/","url":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2022\/06\/cardonet-it-support-logo.svg","contentUrl":"https:\/\/www.cardonet.co.uk\/insights\/wp-content\/uploads\/2022\/06\/cardonet-it-support-logo.svg","width":1,"height":1,"caption":"Cardonet IT Support"},"image":{"@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Cardonet","https:\/\/x.com\/cardonetit","https:\/\/www.linkedin.com\/company\/cardonet"]},{"@type":"Person","@id":"https:\/\/www.cardonet.co.uk\/insights\/#\/schema\/person\/36a7d06561738c35ed9474545767e727","name":"Viki Asimov","sameAs":["http:\/\/www.cardonet.co.uk"]}]}},"_links":{"self":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":2,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"predecessor-version":[{"id":188,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/posts\/183\/revisions\/188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/media\/184"}],"wp:attachment":[{"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cardonet.co.uk\/insights\/wp-json\/wp\/v2\/categories?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}