LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.

Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.

Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Apr 4, 2025
  1. All
  2. IT Services
  3. Information Security

Your employees are pushing back on new security measures. How can you effectively train them?

When your team pushes back on new security protocols, you need to ensure they're well-informed and motivated to comply. Here are some strategies to effectively train them:

  • Educate on importance: Explain why these measures are crucial for the company's safety and their own.

  • Interactive workshops: Use hands-on training sessions to make learning engaging and practical.

  • Provide ongoing support: Offer resources and assistance to help them adjust and understand the new procedures.

How do you approach training on new security measures? Share your thoughts.

Information Security Information Security

Information Security

+ Follow
Last updated on Apr 4, 2025
  1. All
  2. IT Services
  3. Information Security

Your employees are pushing back on new security measures. How can you effectively train them?

When your team pushes back on new security protocols, you need to ensure they're well-informed and motivated to comply. Here are some strategies to effectively train them:

  • Educate on importance: Explain why these measures are crucial for the company's safety and their own.

  • Interactive workshops: Use hands-on training sessions to make learning engaging and practical.

  • Provide ongoing support: Offer resources and assistance to help them adjust and understand the new procedures.

How do you approach training on new security measures? Share your thoughts.

Add your perspective
Help others by sharing more (125 characters min.)
31 answers
  • Contributor profile photo
    Contributor profile photo
    Puneet Taneja

    Founder@Complere Infosystem , Chief planning officer - Driving awareness for Data & AI strategies || Empowering with Smart Solutions

    • Report contribution

    "Security isn't just a department's job; it's everyone's responsibility." When your team pushes back on new security protocols, it’s important to make sure they understand the “why” behind it. Here's how you can get them on board: Educate on Importance: Help them see how these measures protect both the company and their personal data. When they understand the value, they’re more likely to take it seriously. Interactive Workshops: Make training fun and practical! Hands-on sessions where they can practice the protocols will help them feel more comfortable with the changes. Provide Ongoing Support: Change is hard, but with continuous resources and assistance, they’ll feel supported in adapting to the new procedures.

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    Abhay Sharma

    Senior Enterprise Architect @ Wolters Kluwer

    • Report contribution

    When employees push back on new security measures, it's often due to a lack of clarity, sudden process changes, or added friction in their daily tasks. Here's how you can train them effectively and encourage adoption: ✅Create clear and accessible SOPs: Well-documented, step-by-step Standard Operating Procedures (SOPs) can go a long way in reducing resistance. Keep them easy to understand. ✅Smooth the onboarding process: Instead of abrupt rollouts, gradually introduce new security policies. Use phased implementations. ✅Be available and approachable: Make sure there’s a dedicated person or team to address questions / concerns. ✅ Celebrate compliance: Recognize teams or individuals who adopt changes quickly.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To effectively train them, you need to first ask them why they are pushing back on the new security measures. This is so that you would be able to find the right solution to their reasons. You need to also explain to them about the importance of the new security measures. This is because their lack of knowledge could be the reason for their pushback. You must also make sure that if these new measures are too much of a hastle for them, you should try to simplify it as much as possible. This is to avoid it from interfering with their work.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Fabrício Ferreira

    Senior Flutter Engineer | Mobile Developer | Mobile Engineer | Dart | Android | iOS | Kotlin | Firebase

    • Report contribution

    This is such a relevant challenge—security is only as strong as the people behind it! 🔐💡 What’s worked for us is making it personal. Instead of just saying “protect company data,” we explain how breaches could affect their daily work, their clients, and even their own privacy. Once people feel the relevance, they engage more. 🧠✨ We also use short, scenario-based workshops—quick, real-world examples stick way better than long lectures. And we follow up with bite-sized tips and open Q&A sessions to keep the momentum going.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Luis Valente ™

    Information Security & Cyber-Intelligence | Privacy • Compliance • Risk Management | Protect Your Clients' Data & Preserve Your Reputation

    • Report contribution

    Resistance to change is natural, but when it comes to security, it's a challenge we must overcome. 1. Communicate the 'why' behind changes 2. Use relatable scenarios and real-world examples 3. Offer hands-on, interactive training sessions 4. Provide ongoing support and resources 5. Recognize and reward compliance People are more likely to adopt new practices when they understand their importance. Make training engaging and relevant to their daily work. Consider gamification or simulations to make learning fun and memorable. Encourage questions and feedback to address concerns proactively. Creating a culture of security awareness is key, when employees feel empowered and involved, they become your strongest line of defense.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Khawaja Ali Adam

    Achieved $500k | Client Acquisition & High-Ticket Deal Closing | Sales Funnel & Pipeline Optimization | SaaS/Enterprise Sales | Sales Team Training | Sales & Marketing | Inbound/Outbound Sales

    • Report contribution

    Employees resist security changes when they see them as hurdles—not help. Here’s how to win buy-in: 1️⃣ Explain the ‘Why’ First Share real breach stories (e.g., “One click cost Company X $2M”) Link measures to their safety: “This protects YOUR data too” 2️⃣ Gamify Learning Reward teams for spotting test phishing emails Leaderboards for compliance milestones 3️⃣ Embed in Workflows Demo how MFA/logins save time vs. breach cleanup Use shortcuts like “Security Ctrl+S” for data protection 4️⃣ Celebrate Advocates Spotlight employees who model secure habits Peer training > top-down lectures

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Santosh Kumar CISSP, PMP, CISA, CHFI, CIPP/E, CIPM, AIGP

    Cybersecurity & Data Protection Leader | CISO & DPO | GenAI Architect | Fellow of Information Privacy (FIP) | Navy Veteran 🏫 IIT Madras| IIM Indore

    • Report contribution

    "Security compliance rises when people understand the 'why' behind the 'what'." Having transformed resistant cultures into security advocates, I've found that effective security training is about connection, not coercion. 🎯 Create relatable security scenarios showing personal impact, not just corporate risk 🎯 Implement gamified learning with competition, rewards, and recognition systems 🎯 Develop security champions within each department to model and advocate practices 🎯 Use microlearning moments (2-3 minute videos) instead of marathon sessions 🎯 Share anonymized real incident stories that demonstrate actual consequences The organizations with highest security compliance don't force change—they inspire it.

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    David Lim

    Founder ∙ Business Owner ∙ Business & Executive Leader ∙ Trusted Advisor ∙ Former VP of Operations for independent full-service advertising/digital agencies

    • Report contribution

    Openly engage with employees to gather input, gain insights and perspective on why there is pushback on new security measures. Educate employees on the reasoning behind the new security measures so they understand why these measures are essential/necessary and what the potential impacts may be without them. Implement new security measures in phases to allow employees to adapt, adjust, and acclimate. If applicable, provide relevant training and support to help employees make a smooth transition to the new measures. Encourage ongoing employee input and feedback on the new security measures which can be used to make appropriate refinements and improve the overall experience.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Deepa Ajish

    VP - Systems Engineering | ServiceNow Engineering | Transformation & Automation Leader | Security & Compliance Strategist | Product Management | Agile & Scrum Advocate | Passionate About GenAI

    • Report contribution

    Hands-on training sessions are a fantastic way to make learning both interactive and impactful. They allow learners to apply concepts in real-world scenarios, which can boost understanding and retention.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    😎 Stan Patey

    President Slingshot Information Systems, Inc.

    • Report contribution

    Communicate Importance: Explain why the security measures are necessary, highlighting risks and benefits. We direct users to blog articles on recent security breaches, similar to what we’re trying to protect ourselves from Training: We provide step-by-step guidance and short videos detailing how to implement security, such as MFA. Provide Resources: We include links to other articles on the topic. Involve Leadership: Ensure leaders are vocal in their support. Share The Schedule: Let the users know when you plan to implement and how it may impact them. Feedback and Support: Provide channels for feedback and questions, offering ongoing support.

    Like
    1
View more answers
Information Security Information Security

Information Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Information Security

No more previous content
  • Facing a data breach incident in Information Security. How do you prioritize stakeholder needs effectively?

    41 contributions

  • Your team is divided on handling a security breach. How will you navigate conflicting opinions effectively?

    37 contributions

  • You've discovered a security breach during an audit. How do you address it without neglecting other tasks?

    69 contributions

  • You're facing a security incident. How do you decide which operational impacts to address first?

    54 contributions

  • Non-technical stakeholders downplay the risk of a cyber attack. Are you prepared to handle the consequences?

    47 contributions

  • You're focused on security and business success. How can you balance both effectively?

    92 contributions

  • You need to explain security risks to non-technical colleagues. How can you make them understand?

    31 contributions

  • Your users constantly forget their passwords. How can you enhance your security protocols?

    35 contributions

  • Security updates are disrupting your critical business processes. How do you keep operations smooth?

    37 contributions

  • Balancing user demands for customization and security needs, how do you find the perfect solution?

    46 contributions

  • Your team is hesitant about data protection measures. How can you overcome their resistance effectively?

    66 contributions

No more next content
See all

More relevant reading

  • Safety Training
    How do you ensure the confidentiality and security of incident reports?
  • Security Incident Response
    How do you incorporate root cause analysis into your security incident response training and awareness?
  • Incident Response
    How do you pick the right incident response certification?
  • Information Security
    What do you do if you want to enhance your incident response and handling abilities?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • Cybersecurity
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
2
31 Contributions