Vanta automates security compliance.
Please enter your first name
Please enter your last name
Please enter a valid email address
Please enter a job title
Please enter your company name
Please enter your company website
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

How to get your employees to adopt security best practices

August 11, 2022

Strong security is made up of people, processes, and technology. Even with the best protocols and technologies, your company needs buy-in from employees if it wants to avoid unnecessary security risks. 

No matter how big or small your company, one thing never changes—every employee is responsible for security. As your business scales and grows, adopting security best practices becomes more critical and more challenging. 

So how do you get employees to cooperate with your company’s security practices? Although every company's culture and capabilities are different, the below methods will set you on the right path toward better security. 

Teach employees what good security looks like

Setting the goal post for your employee expectations should be your first priority. You shouldn’t assume all of your company’s employees are security experts. Security best practices such as multi-factor authentication, password management, and updating applications may sound simple, but they won’t work if employees aren’t properly trained.

Perhaps more important than the “what” and the “how” is the “why.” It’s simply human nature to want to know that our efforts aren’t in vain and that the tiny hassles are part of the greater good. Being transparent about your company’s security makes it personal and reminds each team member that they really do make a difference. 

Assign trusted security leaders or champions 

Access to sensitive information and tools should be granted to as few employees as possible. This is because high-privilege users likely pose the greatest internal risk to your company. Managers, team leaders, and executives are the minority in most organizations, but 50% of the time they’re the vector for security breaches.

Outside of holding the keys to your company, security champions serve as community leaders. They set the bar and help create a culture of security awareness. They also take the lead when it comes time to recalibrate or update security protocols as your company scales. Security leaders can also grant access as needed, answer questions, and field feedback from employees. 

Use up-to-date tools and communication styles 

Don’t underestimate the power of convenience. Barriers and friction points prevent employees from adopting security best practices. Signing into multiple apps with different passwords is a classic example.

If your systems are outdated or too complicated, employees will find workarounds or simply ignore security obligations. Making security a low-lift responsibility will garner more adoption (and appreciation) than you might expect. This philosophy can also be applied to the way your company disseminates security announcements, updates, or training materials. 

Sending important security materials buried in spreadsheets is no longer the most effective method. Need to send an important security update? Try a short video clip. Do employees need SSO training? Try a webcast and record it for anyone not present. Multimedia options are a sure way to get your message heard.

Create opportunities for feedback, participation, and interaction

As your company grows, communication will be a key factor, especially when it comes to security and compliance risk management. What works well for 50 employees will need to change at 200. 

Periods of change require quick, accurate adjustments. This means your employees must take a more active role in making sure your company is secure. One strategy to accomplish this is to create a place for employees to report bugs, flag security risks, and offer feedback. Providing a space for employees to connect with leaders and bring friction points to the fore is well worth the investment. 

Learn more about security best practices and compliance 

SOC 2 and ISO 27001: Take advantage of common criteria mapping for compliance
Chili Piper streamlines annual SOC 2 monitoring and reporting process

Point-In-Time vs. Continuous Monitoring for Security