Security Awareness Training: Why Annual Videos Don’t Stop Breaches
Organisations spend millions on security awareness training that employees complete once annually by clicking through videos whilst checking email. These programmes satisfy compliance requirements whilst doing almost nothing to change behaviour or prevent security incidents. The problem isn’t that awareness training is useless; it’s that the common implementation of awareness training is useless. Watching a 20-minute video about phishing once per year doesn’t create lasting behaviour change, especially when employees know they can skip through slides without retention consequences.
Why Traditional Training Fails
Annual training dumps information on employees who aren’t primed to receive it. They complete training because it’s mandatory, not because they’re genuinely interested. The content goes in one ear and out the other, creating compliance checkboxes rather than actual awareness. Generic training doesn’t address specific risks facing different roles. The security threats facing developers differ dramatically from those targeting finance staff or executives. One-size-fits-all training wastes time teaching people about risks they’ll never encounter whilst missing crucial information relevant to their actual work. Training doesn’t test employees under realistic conditions. Explaining how phishing works in a video is very different from identifying a convincing phishing email in your inbox when you’re distracted and busy. The gap between theoretical knowledge and practical application is enormous.

Building Effective Awareness Programmes
Implement continuous awareness through short, frequent touchpoints instead of annual marathons. A five-minute monthly security tip delivered via email or chat maintains awareness better than an annual hour-long video. This approach keeps security top-of-mind without overwhelming employees.
Conduct simulated attacks that teach through experience. Send mock phishing emails and provide immediate, private feedback when employees click. Don’t shame or punish people who fall for simulations; use these moments as teaching opportunities. Working with the best penetration testing company includes realistic social engineering testing that identifies training needs.
Expert Commentary
Name: William Fieldhouse
Title: Director of Aardwolf Security Ltd
Comments: “Social engineering success rates during assessments correlate strongly with training quality. Organisations doing only annual compliance training show vulnerability rates above 40 percent, whilst those with continuous, practical programmes often stay below 10 percent. The difference isn’t awareness; it’s practice.”
Tailor content to specific roles and observed vulnerabilities. If your finance team keeps falling for business email compromise attempts, create training specifically addressing that threat with examples relevant to their work. Generic advice about suspicious emails doesn’t help as much as showing them actual attacks targeting similar organisations. Make training engaging and respectful. Security professionals sometimes adopt condescending tones when teaching about threats, implying that users are the problem. This approach breeds resentment and disengagement. Instead, treat employees as partners in security and acknowledge the genuine difficulty of identifying sophisticated attacks.
Measuring Training Effectiveness
Track behaviours, not completion rates. The metric that matters isn’t what percentage of employees finished training; it’s how many report suspicious emails, how many fall for simulated phishing, and whether these numbers improve over time. Behavioural metrics provide actual insight into programme effectiveness. Monitor security incidents for patterns that indicate training gaps. If employees repeatedly expose credentials on phishing sites, your password training isn’t working. If they regularly install unauthorised software, your application security awareness needs improvement. Let incidents guide training priorities.
Regular web application penetration testing can identify security awareness gaps in development teams. Testing reveals whether developers understand secure coding practices or are creating preventable vulnerabilities that training should address.
Cultural Factors in Security Awareness
Create an environment where reporting security concerns is encouraged and rewarded. If employees fear being blamed for security issues, they won’t report incidents or ask questions about suspicious activity. Psychological safety is essential for effective security awareness. Leadership must model secure behaviours. When executives ignore security policies or demand exceptions to controls, it signals that security isn’t actually important. Employees notice this disconnect and adjust their behaviour accordingly. Security awareness requires organisational commitment, not just employee training. Acknowledge that security creates friction and work to minimise it. Don’t pretend that security controls are convenient or ask employees to prioritise security over all other concerns. Instead, help them understand specific threats and provide practical tools for staying secure without excessive burden.
Beyond Compliance Checkbox Training
Evolve training content as threats change. The phishing attacks employees face today differ from those targeting them five years ago. Your training must reflect current threat landscapes, not outdated examples that no longer represent real risks. Incorporate feedback from employees about what training works. They’re the ones receiving the content and can tell you what resonates versus what gets ignored. This input helps refine programmes to be more effective whilst respecting employees’ time and attention. Security awareness training works when it’s continuous, relevant, practical, and respectful. Annual compliance videos satisfy auditors without changing behaviour. Real awareness programmes treat security as an ongoing conversation rather than a yearly lecture, engaging employees as partners in protecting the organisation.