Why Security Awareness Training Fails - and How to Build a Program That Actually Changes Behavior

2026-05-2011 min read

Why Security Awareness Training Fails - and How to Build a Program That Actually Changes Behavior

Every year, organizations spend billions of dollars on security awareness training. Every year, the human factor remains the leading cause of security incidents. The vicious cycle is not a mystery: most security awareness programs are designed to satisfy compliance requirements, not to change behavior.

The annual 30-minute video followed by a five-question quiz does not reduce the probability that an employee will click a phishing link. It satisfies an audit checkbox. Those are different objectives.

If you're building or rebuilding a security awareness program, this guide is about what actually works - the pedagogical approaches that produce measurable behavior change, the metrics that reveal whether your program is doing its job, and the specific Quebec legal obligations under Loi 25 that make employee training not just good practice but a compliance requirement.

The Real Problem: Compliance Training vs. Behavior Change

The gap between compliance training and behavior change is not subtle. It's the difference between asking employees to acknowledge they read a policy and testing whether they can recognize a spear-phishing email targeting their specific role.

Compliance training is designed around the auditor's question: "Can you demonstrate that employees received security training?" Behavior change training is designed around the security team's question: "Has the probability of a human-caused incident actually decreased?"

The evidence on what creates behavior change is clear. Short, frequent interventions outperform long, infrequent ones. Experiential learning (getting caught in a simulated phishing attack) outperforms passive content consumption (watching a video). Role-specific content outperforms generic content. Positive reinforcement outperforms fear-based messaging.

Most corporate security awareness programs do the opposite of all four.

What Loi 25 Actually Requires

Many Quebec organizations approach security awareness training as a best practice rather than a legal obligation. This is a misreading of Loi 25.

The Act respecting the protection of personal information in the private sector (Loi 25) requires organizations to implement measures to ensure the protection of personal information throughout its lifecycle. This includes internal governance measures - which the Commission d'accès à l'information du Québec (CAI) has consistently interpreted to include employee training on data handling responsibilities.

More specifically, Loi 25 requires organizations to designate a person responsible for the protection of personal information (effectively a privacy officer), and that person is accountable for ensuring that employees who handle personal information understand their obligations. "Ensuring understanding" goes beyond distributing a policy document. Documented training records are your evidence.

If you experience a privacy breach and the CAI investigates, one of the first questions will be: what training did your employees receive on handling personal information? An undocumented, once-a-year video is not a strong answer.

The practical implication: your security awareness program must include a specific module on Loi 25 obligations, cover data classification and handling procedures, and maintain records of completion per employee.

The 12-Month Framework That Produces Results

The most effective security awareness programs are not events. They are continuous, progressive, and embedded in the work culture. A 12-month cadence gives you the right architecture.

Q1: Foundations (January–March)

January is for baselines. Before you can measure improvement, you need to know where you're starting. Run a phishing simulation before any training begins. The click rate in an untrained organization is typically 25–40%. Record that number - it's your benchmark.

Cover fundamental hygiene in January: password management, recognizing suspicious emails, and what to do when something looks wrong. Keep modules short (5–10 minutes maximum). Make them accessible on mobile. If employees need to book time in a training room to complete security awareness, your completion rates will reflect that friction.

February is for MFA. Not a video about MFA - an IT-assisted campaign to get 100% of employee accounts enrolled in multi-factor authentication. Set an enrollment deadline. Follow up individually with non-completers. This is the single highest-leverage behavior change you can drive through an awareness program.

March is for Loi 25. Every Quebec employee who handles personal information - which in most organizations means virtually everyone - needs to understand what personal information is, how it must be handled, who is accountable for it, and what to do if they suspect a breach. This module should include scenario-based exercises: Is this data I can share with a vendor? Can I put this in a shared cloud folder? What do I do if I accidentally send a file containing customer data to the wrong person?

Q2: Practical Skills (April–June)

April covers data classification. Employees can't protect data they can't identify. A simple four-level classification scheme (Public, Internal, Confidential, Restricted) gives people a practical framework. Back it up with role-specific examples: what does "Confidential" look like for someone in HR versus finance versus customer service?

May is social engineering. Phishing is one vector of social engineering, but not the only one. Vishing (phone-based), pretexting (fabricated scenarios), and baiting (physical USB drives, fake prizes) are all in active use against Canadian businesses. Run a simulated social engineering exercise - not just email phishing - and use the results to drive targeted follow-up training for employees who were susceptible.

June is incident reporting. One of the most underinvested capabilities in SMB security programs is the employee's willingness to report a potential incident. Employees who clicked a phishing link or shared a credential are often reluctant to report it because they fear discipline. Your program must actively address this. Create a named, non-punitive reporting channel. Celebrate the act of reporting. Train managers to receive reports without creating shame. A single early warning from an employee who admits they clicked a link can save your organization from a full breach.

Q3: Threat-Specific (July–September)

July covers ransomware. Employees don't need to understand the cryptographic mechanics of ransomware - they need to understand that one click on a malicious attachment can take down the organization's systems. Use real-world examples (anonymized, or from public breach reports). Walk through what happens after a ransomware infection, including the investigation, downtime, and recovery cost. The goal is visceral understanding of consequence, not fear.

August is supply chain security. The SolarWinds attack, the Kaseya VSA attack, the MOVEit vulnerability - the supply chain is a consistent, reliable attack path because it leverages trust. Employees in procurement, IT, and finance need to understand that a legitimate-looking vendor portal or software update can be a delivery mechanism for malware. This is especially relevant for organizations that have undergone rapid cloud SaaS adoption and have dozens of vendor integrations with access to internal systems.

September is physical security. Tailgating (following an authorized person through a secure door), shoulder surfing, unlocked workstations, and documents left on desks - these are not hypothetical. They are regular occurrences in offices that have strong digital security but weak physical access controls. Run a physical security awareness exercise.

Q4: Advanced and Reinforcement (October–December)

October covers cloud and SaaS security for end users. By 2026, most employees are using a dozen or more SaaS applications - many of which were adopted informally, without IT review. Address shadow IT directly: what tools are approved, why certain tools are prohibited for sensitive data, and what to do if someone wants to use a new tool. The question "can I put this in ChatGPT?" has a specific answer that most employees don't know.

November is travel and mobile security. For employees who travel with company devices, the risk surface expands dramatically. Public WiFi, hotel networks, and border crossing device inspections create specific risk scenarios. Cover VPN requirements, device encryption, and what to do if a device is lost or stolen.

December is the annual review. Run a comprehensive phishing simulation. Compare your click rate to January's baseline. Present the results to the full organization. Recognize top performers. Issue completion certificates. Use the survey results to design next year's program.

The Metrics That Actually Matter

Most organizations measure security awareness training by completion rate. This is the wrong metric. Completion rate measures whether employees watched a video. It does not measure whether they changed their behavior.

The metrics worth tracking:

Phishing simulation click rate - track monthly. A program working correctly should reduce click rate from a 25–40% baseline to under 5% over 12 months. If your click rate isn't decreasing, your training content is not creating behavior change.

Incident report volume - this is a counterintuitive metric. A well-run security awareness program should increase the number of security incidents reported, at least initially. This means employees are recognizing suspicious activity and feeling safe to report it.

MFA adoption rate - should reach 100% within 60 days of a deliberate enrollment campaign. Anything below 95% is a program failure.

Post-module quiz scores - track improvement from pre-test to post-test per module. Target 30% or greater improvement. If employees are scoring 95% on the pre-test, the module isn't teaching them anything new.

Credential hygiene compliance - use your identity provider's reporting to measure password reuse, compromised credential alerts, and access key age. These are behavioral indicators of whether training is translating to action.

Building the Security Culture That Makes Training Stick

Training is a mechanism. Culture is what makes it sustainable. The organizations where security awareness programs achieve lasting results share a common characteristic: security is visibly prioritized by leadership.

When executives complete the same training as front-line employees, when security metrics are presented at board meetings, when the CISO or security lead is a visible presence in the organization rather than a background function - employees internalize that security is real, not performative.

The inverse is also true. When leaders skip training modules, when security incidents are minimized in internal communications, when the security team is chronically under-resourced - employees read the signal accurately. They treat security as someone else's responsibility.

Your security awareness program starts with leadership. If executives are not enrolled, not completing modules, and not modeling the behaviors you're trying to build, you're starting from a structural deficit.

Your 3 Actions This Week

1. Run a baseline phishing simulation. Before any training, send a simulated phishing email to your full employee population. The results will be humbling - and essential. You cannot measure program impact without a starting point.

2. Designate a privacy officer for Loi 25 compliance. If you haven't already, name a person responsible for the protection of personal information. This person should own the Loi 25 training module and maintain employee training records.

3. Download the 12-month training roadmap. It includes monthly module outlines, quiz question templates, phishing simulation guidance, and recognition program ideas.

Download the 12-Month Training Roadmap

Get the full program with monthly module outlines, quiz templates, phishing simulation guidance, and Loi 25 training requirements.

No spam. Unsubscribe at any time.

Need Expert Guidance?

Our fractional vCISO service provides security leadership and strategic guidance tailored to your organization.