IT Leaders Value IT Security Training, Yet Many Organizations Are Inconsistent

November, 2024

IT security training is a business best practice that involves training all IT and user personnel in a company’s security policies and procedures. This increases awareness and ensures compliance, making it a highly advisable practice for every company. However, too many adopters are only conducting security training in an inconsistent manner, which can have dire consequences.

As shown in Figure 3 from our full report, IT Security Training Best Practices,  only 25% of our survey respondents indicate that they conduct IT security training formally and consistently, while 49% practice it formally but inconsistently, and 13% practice it informally. Another 9% of survey respondents are still implementing security training for the first time. The remaining 4% admit that they do not conduct IT security training at all.

Security policies must be supported by formal and consistent training of staff on the various threats they may face, how they should respond, and what the company expects of them in terms of compliance. Training helps ensure that employees do not create vulnerabilities by neglecting policies and procedures or by taking shortcuts.

To ensure formal and consistent training of all IT personnel and employees in a company’s security policies, procedures, and best practices, a set of questions must be answered. Our full report provides a suggested list of self-assessment questions to help you and your organization determine if your security training program needs improvement.

“Security policies and procedures are ineffective unless constantly updated and renewed,” said Reneece Sterling, senior research analyst for Avasant Research, based in Los Angeles. “Training should be continuous to match the ever-changing threat landscape.”

Security training has a moderate maturity rating this year relative to the other practices in the IT Management Best Practices study. However, the number of survey respondents consistently and formally conducting security training falls far short of the number practicing it to some degree. Thus, existing training programs should be evaluated to determine how they can be improved.

In our full report, we study the adoption and practice levels for security training and examine those by organization size and sector. As noted previously, we also include a set of self-assessment questions and conclude with recommendations to effectively carry out security training.


This Research Byte is a brief overview of our report on this subject, IT Security Training Best Practices. The full report is available at no charge for subscribers, or it may be purchased by non-clients directly from our website (click for pricing).

CONTACT US

DISCLAIMER:

Avasant’s research and other publications are based on information from the best available sources and Avasant’s independent assessment and analysis at the time of publication. Avasant takes no responsibility and assumes no liability for any error/omission or the accuracy of information contained in its research publications. Avasant does not endorse any provider, product or service described in its RadarView™ publications or any other research publications that it makes available to its users, and does not advise users to select only those providers recognized in these publications. Avasant disclaims all warranties, expressed or implied, including any warranties of merchantability or fitness for a particular purpose. None of the graphics, descriptions, research, excerpts, samples or any other content provided in the report(s) or any of its research publications may be reprinted, reproduced, redistributed or used for any external commercial purpose without prior permission from Avasant, LLC. All rights are reserved by Avasant, LLC.

Welcome to Avasant

LOGIN

Login to get free content each month and build your personal library at Avasant.com

NEW TO AVASANT?

Click on the button below to Sign Up

Welcome to Avasant