{"id":18017,"date":"2022-05-30T10:35:39","date_gmt":"2022-05-30T10:35:39","guid":{"rendered":"https:\/\/www.cyberguru.it\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/"},"modified":"2023-04-07T14:54:34","modified_gmt":"2023-04-07T14:54:34","slug":"cyber-security-awareness-the-top-8-causes-of-failure","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/","title":{"rendered":"Cyber Security Awareness: The top 8 causes of failure"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;]<\/p>\n<h4><em>The eight main causes of the failure of Cyber Security Awareness training programmes <em><em>illustrated by Gianni Baroni, CEO of Cyber Guru, at Cybertech<\/em><\/em> Europe<\/em><\/h4>\n<\/p>\n<p>According to many experts, our era is a kind of &#8220;golden age&#8221; for European technology. In short, a real exploit, despite the various health and geopolitical crises. Or perhaps precisely because of them. Commercial, industrial, governmental and academic sectors are all involved in the new challenge of digital transformation. But new opportunities always bring with them new challenges: a worldwide increase in cyber attacks, including those to the Supply Chain, the payment of ransoms due to Ramsonware attacks, the numerous phishing activities and attempts to violate privacy.<\/p>\n<\/p>\n<p>This is what emerged from the European Cybertech event, the main networking platform that conducts events in the industrial field around the world and that was held over a very intense two days on 10 and 11 May in Rome. The event brought together the main players in the sector, as well as personalities from the worlds of politics and economics.<\/p>\n<\/p>\n<p>As one of these, Cyber Guru could not miss it: one of the main European points of reference on Cyber Security Awareness, which so far has trained about 250,000 users on cyber risks related to the digital world and carried out over two million phishing simulations.<\/p>\n<\/p>\n<p>Gianni Baroni, CEO of Cyber Guru, was among the protagonists of the events of 11 May with a speech in which he illustrated the <strong>8 main causes of the failure of Cyber Security Awareness projects<\/strong> and what must be done in order not to fall into easy traps.<\/p>\n<\/p>\n<h5>1. <strong>Lack of support from the CEO<\/strong><\/h5>\n<\/p>\n<p>Simply put, it needs to be clear to all employees that the CEO is the first to believe that transforming human behaviours is a key element in securing the company against cyber attacks. The possible lack of this support is manifested both in terms of communication: not conveying to employees the centrality of the issue of awareness of cyber risks and the importance of prevention, and in terms of the lack of follow-up. In fact, it is important that the KPIs (Key Performance Indicators), i.e. the measurements that a company uses to evaluate its performance over time in terms of employee awareness, are never neglected and are discussed during staff meetings. If this does not happen, it can be a problem, because the company lacks the right awareness of how much Cyber Security Awareness is a non-negligible and top-priority issue today.<\/p>\n<\/p>\n<h5>2. <strong>Poor user engagement<\/strong><\/h5>\n<\/p>\n<p>Training courses with predictable and uninvolving content have the effect of boring the employee and fail miserably in their purpose. For this reason, it is essential that Cyber Security Awareness platforms are: easy to use, use innovative technologies and training methodologies, rely on accurate localisation and engaging gamification and, finally, present topics that are relevant to users. In summary, they should be effective and motivating.<\/p>\n<\/p>\n<h5>3. <strong>Short-term training courses<\/strong><\/h5>\n<\/p>\n<p>Changing end-user behaviour is a complex pathway that takes time to be metabolised and adopted. Training on cyber risks, therefore, cannot be rapid and short-lived. In addition, as threats and attack techniques are increasingly refined and constantly evolving, it is necessary to have constantly updated training that follows the evolution of cyber attacks. Only by knowing the enemy thoroughly and anticipating their possible moves can you be sure to defeat them.<\/p>\n<\/p>\n<h5>4. <strong>The absence of a concrete analysis of performance<\/strong><\/h5>\n<\/p>\n<p>One thing is certain: when you take a training course, you cannot improve if you do not constantly test what you have learned. Continuous monitoring of user engagement and behavioural changes during the learning pathway is a key element of training. If this aspect is lacking or is not monitored with the attention it deserves, all training can be compromised.<\/p>\n<\/p>\n<h5>5. <strong>Relying on &#8220;white phishing&#8221;<\/strong><\/h5>\n<\/p>\n<p>That is, on the same simulation for everyone. Sending fake phishing emails to employees and seeing if they fall into the trap is too vague a training mode, compared to the complexity of the cyber world. Or at least it can&#8217;t be considered complete. To increase awareness, it is necessary to proceed with emails of varying complexity, but which are also different for different users. Anti-phishing training that is not the same for everyone, but personalised for each employee.<\/p>\n<\/p>\n<h5>6. <strong><strong>Relying on questionnaire-based Risk Assessment activities<\/strong><\/strong><\/h5>\n<\/p>\n<p>To assess with a minimum level of accuracy the level of knowledge of the cyber risks of an employee through a questionnaire, it is necessary to prepare a set of 20\u201330 questions. We all know very well that questionnaires of this length are certainly not appreciated by end-users who, therefore, very often, fill them out carelessly. So the results of these surveys are largely unreliable. The decisive aspect that makes the difference in a training path is the readiness for practical reaction. The ability to respond promptly to a cyber attack is not measured by questions, but by measuring reactions to the most likely stimuli. A training and measurement platform is the right answer to this need.<\/p>\n<\/p>\n<h5>7. <strong>Thinking: &#8220;My employees are different&#8221;<\/strong><\/h5>\n<\/p>\n<p>Cyber Guru&#8217;s experience, based on the training paths of hundreds of thousands of employees, leads to the conclusion that the vast majority of end users, regardless of the organisation they work for and their duties, make the same basic mistakes. And it is on these mistakes that we must work. Training, therefore, should not be extremely personalised, which would make it particularly costly. Its effectiveness depends above all on its accuracy, on its ability to use different tools, to involve users also from the point of view of emotional reactions and, above all, on it being up-to-date and carried out on an ongoing basis.<\/p>\n<\/p>\n<h5>8. <strong>Having an understaffed team<\/strong><\/h5>\n<\/p>\n<p>Security teams are always overworked. For this reason, training is very often given a lower priority than other critical IT activities. Before undertaking a Cyber Security Awareness training course, it is therefore essential to clearly understand the commitment necessary to manage it. For this reason, it is important to choose solutions that minimise management costs and maximise the effectiveness of training results.<\/p>\n<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru, at Cybertech Europe According to many experts, our era is a kind of &#8220;golden age&#8221; for European technology. In short, a real exploit, despite the various health and geopolitical crises. Or perhaps precisely because [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":15643,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<!-- wp:heading {\"level\":4} -->\n<h4><em>The eight main causes of the failure of Cyber Security Awareness training programmes <em><em>illustrated by Gianni Baroni, CEO of Cyber Guru, at Cybertech<\/em><\/em> Europe<\/em><\/h4>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>According to many experts, our era is a kind of \"golden age\" for European technology. In short, a real exploit, despite the various health and geopolitical crises. Or perhaps precisely because of them. Commercial, industrial, governmental and academic sectors are all involved in the new challenge of digital transformation. But new opportunities always bring with them new challenges: a worldwide increase in cyber attacks, including those to the Supply Chain, the payment of ransoms due to Ramsonware attacks, the numerous phishing activities and attempts to violate privacy. <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>This is what emerged from the European Cybertech event, the main networking platform that conducts events in the industrial field around the world and that was held over a very intense two days on 10 and 11 May in Rome. The event brought together the main players in the sector, as well as personalities from the worlds of politics and economics.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>As one of these, Cyber Guru could not miss it: one of the main European points of reference on Cyber Security Awareness, which so far has trained about 250,000 users on cyber risks related to the digital world and carried out over two million phishing simulations.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Gianni Baroni, CEO of Cyber Guru, was among the protagonists of the events of 11 May with a speech in which he illustrated the <strong>8 main causes of the failure of Cyber Security Awareness projects<\/strong> and what must be done in order not to fall into easy traps.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>1. <strong>Lack of support from the CEO<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Simply put, it needs to be clear to all employees that the CEO is the first to believe that transforming human behaviours is a key element in securing the company against cyber attacks. The possible lack of this support is manifested both in terms of communication: not conveying to employees the centrality of the issue of awareness of cyber risks and the importance of prevention, and in terms of the lack of follow-up. In fact, it is important that the KPIs (Key Performance Indicators), i.e. the measurements that a company uses to evaluate its performance over time in terms of employee awareness, are never neglected and are discussed during staff meetings. If this does not happen, it can be a problem, because the company lacks the right awareness of how much Cyber Security Awareness is a non-negligible and top-priority issue today.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>2. <strong>Poor user engagement<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Training courses with predictable and uninvolving content have the effect of boring the employee and fail miserably in their purpose. For this reason, it is essential that Cyber Security Awareness platforms are: easy to use, use innovative technologies and training methodologies, rely on accurate localisation and engaging gamification and, finally, present topics that are relevant to users. In summary, they should be effective and motivating.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>3. <strong>Short-term training courses<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Changing end-user behaviour is a complex pathway that takes time to be metabolised and adopted. Training on cyber risks, therefore, cannot be rapid and short-lived. In addition, as threats and attack techniques are increasingly refined and constantly evolving, it is necessary to have constantly updated training that follows the evolution of cyber attacks. Only by knowing the enemy thoroughly and anticipating their possible moves can you be sure to defeat them.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>4. <strong>The absence of a concrete analysis of performance<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>One thing is certain: when you take a training course, you cannot improve if you do not constantly test what you have learned. Continuous monitoring of user engagement and behavioural changes during the learning pathway is a key element of training. If this aspect is lacking or is not monitored with the attention it deserves, all training can be compromised.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>5. <strong>Relying on \"white phishing\"<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>That is, on the same simulation for everyone. Sending fake phishing emails to employees and seeing if they fall into the trap is too vague a training mode, compared to the complexity of the cyber world. Or at least it can't be considered complete. To increase awareness, it is necessary to proceed with emails of varying complexity, but which are also different for different users. Anti-phishing training that is not the same for everyone, but personalised for each employee.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>6. <strong><strong>Relying on questionnaire-based Risk Assessment activities<\/strong><\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>To assess with a minimum level of accuracy the level of knowledge of the cyber risks of an employee through a questionnaire, it is necessary to prepare a set of 20\u201330 questions. We all know very well that questionnaires of this length are certainly not appreciated by end-users who, therefore, very often, fill them out carelessly. So the results of these surveys are largely unreliable. The decisive aspect that makes the difference in a training path is the readiness for practical reaction. The ability to respond promptly to a cyber attack is not measured by questions, but by measuring reactions to the most likely stimuli. A training and measurement platform is the right answer to this need.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>7. <strong>Thinking: \"My employees are different\"<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Cyber Guru's experience, based on the training paths of hundreds of thousands of employees, leads to the conclusion that the vast majority of end users, regardless of the organisation they work for and their duties, make the same basic mistakes. And it is on these mistakes that we must work. Training, therefore, should not be extremely personalised, which would make it particularly costly. Its effectiveness depends above all on its accuracy, on its ability to use different tools, to involve users also from the point of view of emotional reactions and, above all, on it being up-to-date and carried out on an ongoing basis.<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:heading {\"level\":5} -->\n<h5>8. <strong>Having an understaffed team<\/strong><\/h5>\n<!-- \/wp:heading -->\n\n<!-- wp:paragraph -->\n<p>Security teams are always overworked. For this reason, training is very often given a lower priority than other critical IT activities. Before undertaking a Cyber Security Awareness training course, it is therefore essential to clearly understand the commitment necessary to manage it. For this reason, it is important to choose solutions that minimise management costs and maximise the effectiveness of training results<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p> <\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:group {\"backgroundColor\":\"very-light-gray\"} -->\n<div class=\"wp-block-group has-very-light-gray-background-color has-background\"><!-- wp:paragraph {\"align\":\"center\"} -->\n<p class=\"has-text-align-center\"><strong>To find out more about Cyber Guru training courses<\/strong><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:group -->\n\n<!-- wp:columns -->\n<div class=\"wp-block-columns\"><!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:image {\"id\":5779,\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/\" target=\"_blank\" rel=\"noopener\"><img src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGA_new.png\" alt=\"\" class=\"wp-image-5779\"\/><\/a><\/figure>\n<!-- \/wp:image -->\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph --><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:image {\"id\":5780,\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/soluzioni-cyber-security-awareness\/cyber-guru-phishing\/\" target=\"_blank\" rel=\"noopener\"><img src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/05\/CGP_new.png\" alt=\"\" class=\"wp-image-5780\"\/><\/a><\/figure>\n<!-- \/wp:image --><\/div>\n<!-- \/wp:column -->\n\n<!-- wp:column -->\n<div class=\"wp-block-column\"><!-- wp:image {\"id\":6471,\"sizeSlug\":\"full\",\"linkDestination\":\"custom\"} -->\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cyberguru.it\/cyber-guru-channel\/\" target=\"_blank\" rel=\"noopener\"><img src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2020\/10\/CGC_new.png\" alt=\"\" class=\"wp-image-6471\"\/><\/a><\/figure>\n<!-- \/wp:image --><\/div>\n<!-- \/wp:column --><\/div>\n<!-- \/wp:columns -->\n\n<!-- wp:paragraph -->\n<p><\/p>\n<!-- \/wp:paragraph -->","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[422],"tags":[487,468,470,488],"class_list":["post-18017","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","tag-cyber-awareness-en-2","tag-cyber-security-en-2","tag-cyber-security-awareness-en-3","tag-cybersecurity-trends-en-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Security Awareness: The top 8 causes of failure<\/title>\n<meta name=\"description\" content=\"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Awareness: The top 8 causes of failure\" \/>\n<meta property=\"og:description\" content=\"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-30T10:35:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-07T14:54:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"290\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cyber Security Awareness: The top 8 causes of failure\",\"datePublished\":\"2022-05-30T10:35:39+00:00\",\"dateModified\":\"2023-04-07T14:54:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/\"},\"wordCount\":1108,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/8-reason-project-fails.webp\",\"keywords\":[\"Cyber Awareness\",\"Cyber Security\",\"Cyber Security Awareness\",\"cybersecurity trends\"],\"articleSection\":[\"Security Awareness\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/\",\"name\":\"Cyber Security Awareness: The top 8 causes of failure\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/8-reason-project-fails.webp\",\"datePublished\":\"2022-05-30T10:35:39+00:00\",\"dateModified\":\"2023-04-07T14:54:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/8-reason-project-fails.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/8-reason-project-fails.webp\",\"width\":500,\"height\":290,\"caption\":\"8-reason-project-fails\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/2022\\\/05\\\/30\\\/cyber-security-awareness-the-top-8-causes-of-failure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/home-page-v2-draft\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Awareness: The top 8 causes of failure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/en\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Security Awareness: The top 8 causes of failure","description":"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Awareness: The top 8 causes of failure","og_description":"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...","og_url":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-05-30T10:35:39+00:00","article_modified_time":"2023-04-07T14:54:34+00:00","og_image":[{"width":500,"height":290,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Written by":"m.baciucco","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cyber Security Awareness: The top 8 causes of failure","datePublished":"2022-05-30T10:35:39+00:00","dateModified":"2023-04-07T14:54:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/"},"wordCount":1108,"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp","keywords":["Cyber Awareness","Cyber Security","Cyber Security Awareness","cybersecurity trends"],"articleSection":["Security Awareness"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/","url":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/","name":"Cyber Security Awareness: The top 8 causes of failure","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp","datePublished":"2022-05-30T10:35:39+00:00","dateModified":"2023-04-07T14:54:34+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"The eight main causes of the failure of Cyber Security Awareness training programmes illustrated by Gianni Baroni, CEO of Cyber Guru...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/06\/8-reason-project-fails.webp","width":500,"height":290,"caption":"8-reason-project-fails"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/en\/2022\/05\/30\/cyber-security-awareness-the-top-8-causes-of-failure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/en\/home-page-v2-draft\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Awareness: The top 8 causes of failure"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/en\/#website","url":"https:\/\/www.cyberguru.it\/en\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/en\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/en\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/18017","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/comments?post=18017"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/18017\/revisions"}],"predecessor-version":[{"id":29831,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/posts\/18017\/revisions\/29831"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media\/15643"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/media?parent=18017"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/categories?post=18017"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/en\/wp-json\/wp\/v2\/tags?post=18017"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}