Blog

Home / Resources / Blog Post

Secure Employee Behavior Is Equally as Important as Secure Technology

Written by Teknita Team

May 11, 2022


Considering that we use technology all day long in our personal lives and at work, it makes sense that cybercrime is on everyone’s mind. A prominent data Breach Investigation Report reported a record total of 157,525 incidents in categories that ranged from malware to hacking, social engineering breaches to ransomware. And cybercrime continues to evolve. Some of the most successful attack vectors in recent times — like phishing — target people, not technology. According to the report, phishing was the top threat vector in 2019 and was involved in 32% of confirmed breaches, and 78% of cyber-espionage incidents.

The threat landscape is more complex than ever, and it’s increasingly difficult for security teams to prevent, detect, analyze, and respond to threats. Cybercriminals have shifted their tactics from technological attacks to targeted assaults on employees by exploiting basic human behaviors. As security technology has grown more advanced, hackers look to access the weakest point in the network — most often that turns out to be human error. Security training opportunities, like this badge, are more important than ever. Since employees present the easiest target for hackers, it’s crucial that everyone learns how to protect themselves, and your company. More than ever before, every person has an impact on security regardless of their function or title.

It takes only one employee opening a phishing email to set off a chain of events that may compromise your company’s data. This means that security should be an integrated part of everyone’s job. In this module, we look at some basic behaviors that every employee can adopt to help make the company more secure.

Intruders Exploit Human Behaviors

Let’s talk about how human nature plays into cybercrime. Criminals have learned they can exploit typical human feelings, such as curiosity and the desire to please, to steal credentials and infiltrate your network. Let’s dig into some of the messaging that elicits these emotions.


Fear: “If you don’t give me the information, I will report you to your manager.”


Trust: “Your bank account has just been closed. Click here to reactivate.”


Morality: “Can you hold that office door open for me? My arm’s broken, and this package is heavy.”


Reward: “My company is considering investing in your products. Can you answer a few questions about your organization first?”


Conformity: “Bill Stevens from Finance always gives me updates about Q2 earnings, but I can’t get a hold of him. Can you help me with the report?”


Curiosity: “Wow… Check out this video of a giant snake eating a zookeeper!”


Would you like to know more about cybersecurity?

Teknita has the expert resources to support you. Contact us now to kick off your planning with a complimentary assessment with our experts. 

0 Comments

Related Articles

Building a Future-Proof Content Strategy in the AI Era

Building a Future-Proof Content Strategy in the AI Era

Everyone’s talking AI. But here’s the truth: without the right content foundation, AI is just a buzzword. If your content is scattered, unlabeled, and outdated, no amount of machine learning can save you. Want real insight? Start with smart ECM. 🧱 What Future-Proof...

The Compliance Trap: How to Stay Ahead of Regulations with ECM

The Compliance Trap: How to Stay Ahead of Regulations with ECM

Compliance shouldn’t be a scramble. Yet too many teams hit panic mode when audits, investigations, or certifications show up. That’s the compliance trap: being reactive instead of ready. The solution? ECM that bakes governance into every click, upload, and approval. 🚧...

Automating Document Workflows: Where to Start and What to Avoid

Automating Document Workflows: Where to Start and What to Avoid

Manual document handling? It’s the slow lane. If your workflows still rely on spreadsheets, email approvals, or hallway handoffs, you’re not just wasting time—you’re losing momentum. It’s time to shift gears and let automation drive. With the right ECM strategy,...

Stay Up to Date With The Latest News & Updates

Join Our Newsletter

Keep up to date with the latest industry news.

Follow Us

Lets socialize!