Security Awareness Training

    The gap isn't knowledge—it's behavior

    Why security awareness training is becoming security behavior management

    by Kurt Werner  

    Key Points

    • Most employees already know about phishing, but under pressure—facing AI-generated, highly personalized attacks—they click anyway. Traditional training measures like completion rates and simulated click rates look good on paper but don't reflect actual risk.
    • Mimecast's data indicates that roughly 8% of employees account for 80% of security incidents, yet one-size-fits-all training programs fail to identify or address these high-risk individuals because risk signals are scattered across disconnected tools.
    • Rather than relying on scheduled training, organizations need to connect risk signals across the security stack to build individual risk profiles and deliver brief, contextual nudges at the moment risky behavior occurs—turning security from a compliance exercise into something with which employees personally engage.

    Security awareness training has a metrics problem—not because the metrics look bad, but because they look good. Completion rates are up. Simulated phishing click rates have come down. The quarterly board report reflects steady progress.

    And yet, the breaches keep happening. Credentials keep getting stolen. Employees keep clicking links they shouldn't, uploading data to places they shouldn't, and responding to requests they should have questioned.

    This isn't a failure of awareness. It's a failure of the model. The problem was never that people don't know about phishing—it's that under pressure, juggling dozens of applications and responding to an email that looks exactly like it came from their CFO, they click anyway. The gap isn't knowledge. It's action.

    The threat landscape has moved on

    Attackers now use AI to generate highly personalized phishing emails in seconds, clone executive voices, and adapt lures in real time. According to ENISA's 2025 Threat Landscape, AI-supported phishing represents more than 80% of observed social engineering activity worldwide. Per Mimecast's 2025 Global Threat Intelligence Report, 77% of all cyberattacks now begin with phishing, up from 60% just a year earlier.

    When the suspicious email is nearly indistinguishable from a legitimate one—AI-generated, personalized, sent from a spoofed domain—"spot the typo" doesn't hold up as a strategy. The response can't be more awareness. It has to be smarter intervention, grounded in what employees actually do.

    Human risk has a shape—and it's not evenly distributed

    At Mimecast, we break human risk into three dimensions. Action—well-intentioned mistakes made under pressure. Attack—when employees are deliberately targeted through phishing, BEC, or AI-generated lures. And Access—when legitimate access gets misused, whether uploading sensitive data to an unapproved AI tool, privilege abuse, or taking IP on the way out.

    What this framework reveals is that human risk is not evenly distributed. Our data shows that as few as 8% of employees are responsible for 80% of security incidents—consistent across organizations of every size and industry. A one-size-fits-all training program doesn't just fail to address that 8%—it makes them invisible.

    Identifying them requires connecting signals—phishing events, malware alerts, identity anomalies, sensitive data violations—that exist across most security stacks but are scattered across disconnected tools, never tied to the individual employees who generated them.

    Why awareness training can't close this gap alone

    Security awareness training emerged as a compliance function and never outgrew that architecture: broadcast training to the full workforce, measure completions and click rates, report to the board. The data tells the story: 60% of breaches involve the human element (Verizon 2025 DBIR), yet 72% of organizations run awareness programs without continuous risk monitoring (Mimecast State of Human Risk 2026).

    Standalone awareness platforms can show completion rates and phishing click trends. But they can't tell you which employees are genuinely high-risk right now, what's driving that risk, or how to intervene before something goes wrong. That's why the conversation is shifting from "how many employees completed training" to "how is our human risk actually changing?"

    What security behavior management changes

    Security behavior management is a different model—built around what people actually do rather than what they're told to know.

    Visibility. The Mimecast Human Risk Command Center connects risk signals from across the security stack—email behavior, real phishing incidents, malware events, identity anomalies, sensitive data handling, simulation and training results—normalized around individual employees. Seventeen integrations across six behavioral risk categories, delivering individual-level risk intelligence in real time.

    For organizations already running Mimecast email security, the threat intelligence already being processed—every phishing attempt, every blocked threat, every risky click—becomes the behavioral foundation. You're not adding a new tool with its own data silo. You're activating intelligence already flowing through your environment.

    Intervention at the moment of risk. Mimecast Engage delivers behavioral nudges—20-to-40-second micro-learning modules via email, Slack, or Teams—triggered the moment a risky behavior occurs. A tight feedback loop between action and consequence, delivered in context, not scheduled for next Tuesday's training session.

    Security that feels personal. Personalized user scorecards give every employee a monthly view of their own risk score, training status, phishing results, and security events. When people see their own risk reflected back, security shifts from abstract compliance to something they own. That's where security culture actually builds.

    Platform architecture is the real differentiator

    A standalone awareness tool can only see simulation results and training completions. An integrated security platform connects all of it—knowing not just that an employee clicked a simulated phishing link, but that they also received a real phishing email last week, had an unusual identity event, and missed three consecutive training modules. That's an individual risk profile, and it's what makes adaptive intervention possible at scale.

    One approach tells you how your training program is performing. The other tells you how your human risk is changing—and who to act on before something breaks.

    Where to start

    The shift to security behavior management doesn't require starting over. For most organizations, the signals and data already exist. What's missing is the platform to connect it.

    The Mimecast State of Human Risk 2026 Report goes deeper on where organizations believe their human risk programs stand versus where they actually are. And if you're a Mimecast customer ready to explore what this looks like in practice, your account team can walk you through what Mimecast Engage adds on top of your existing email security investment. The infrastructure is likely already in place. Engage puts it to work.

    Si abboni a Cyber Resilience Insights per altri articoli come questi.

    Riceva tutte le ultime notizie e le analisi del settore della cybersecurity direttamente nella sua casella di posta elettronica.

    Iscriviti con successo

    Grazie per essersi iscritto per ricevere gli aggiornamenti del nostro blog

    Ci terremo in contatto!

    È pronto a proteggere il livello umano? DEMO
    Back to Top