• Home
  • Africa’s Innovation Frontier
  • Africa’s Future Tech
  • Investor Hotspots
  • Reports
  • Home
  • Africa’s Innovation Frontier
  • Africa’s Future Tech
  • Investor Hotspots
  • Reports
Home Cybersecurity

Why 95% of Cyber Attacks Start With Your Employees (And How Smart Companies Fix This)

Three South African IT leaders reveal how they turned their staff from security risks into cyber guardians, proving culture change is the ultimate firewall.

by Faith Amonimo
October 24, 2025
in Cybersecurity, Event Radar Africa
Reading Time: 7 mins read
Why 95% of Cyber Attacks Start With Your Employees (And How Smart Companies Fix This)
Share on FacebookShare on Twitter

Your biggest cybersecurity threat isn’t lurking in dark web forums or sophisticated hacking tools. It sits at desks across your office, checks emails every morning, and holds the keys to your most sensitive data.

Recent research reveals human error drives 95% of all data breaches in 2024. Just 8% of your workforce accounts for 80% of security incidents. Yet while companies pour millions into advanced security systems, most ignore the obvious solution right in front of them.

Three IT leaders from South Africa’s biggest companies recently shared how they turned their employees from security risks into cyber guardians. Their approach doesn’t rely on fear tactics or complex technology. Instead, they built something more powerful: a culture where cyber vigilance becomes second nature.

Your Receptionist Could Bankrupt Your Company

Pulana Ngwasheng from Avis Budget Group puts it bluntly: “The entry point to a breach can be your receptionist’s desk.” She’s not exaggerating. The Change Healthcare ransomware attack that cost millions started with one employee clicking on a phishing email.

Traditional security thinking focuses on perimeter defense, firewalls, encryption, and access controls. But attackers know better. They target the weakest link by using human psychology.

“Cybersecurity has evolved beyond IT,” Pulana explains. “It’s now an organizational issue that must be part of the company’s DNA. You can lose your business from one cyber incident.”

Consider these numbers:

  • Companies lose an average of $13.9 million per insider-driven data breach
  • 43% of organizations saw increased internal threats in the past 12 months
  • 66% expect insider-driven data loss to grow this year

The math is simple. Your people either protect you or destroy you. There’s no middle ground.

Why Annual Training Sessions Fail Spectacularly

Most companies treat cybersecurity training like a checkbox exercise. Gather everyone in a conference room once a year, show some slides about password security, and call it done.

Sibusiso Mbingo from glu Mutual explains why this approach backfires: “Expecting lasting behavior change from just one training session a year is unrealistic. People quickly forget.”

Research backs him up. Studies show annual training produces only a 2% reduction in phishing click rates. Meanwhile, companies using continuous, engaging training methods see 86% improvement over 12 months.

The problem isn’t frequency alone. Traditional training treats employees like security obstacles instead of security partners. It lectures instead of engages. It threatens instead of teaches.

Smart companies flip this script entirely.

How Gamification Turns Security Training Into Competition

At glu Mutual, cybersecurity training looks more like a mobile game than a corporate presentation. Small, interactive lessons appear throughout the year. Employees earn points for reporting suspicious emails. Leaderboards track department performance.

“We use small, interactive lessons throughout the year, fun but educational,” Sibusiso says. “And because it’s ongoing, it becomes part of everyday thinking.”

The results speak volumes. Gamified security training:

  • Boosts employee engagement by 60%
  • Increases productivity by measurable amounts
  • Creates healthy competition between departments
  • Makes security awareness stick longer

But gamification alone isn’t enough. The real secret lies in personalization.

Why Your Finance Team Needs Different Training Than Marketing

Dr. Denisha Jairam-Owthar from the Council of Medical Schemes discovered something crucial: different departments face different cyber risks. Generic training misses these nuances entirely.

“Finance, payroll, and marketing all have different exposure points,” she notes. “We tailor their training accordingly.”

This makes perfect sense. Your accounting team handles financial transfers and vendor payments. Your marketing team manages social media accounts and customer databases.

Role-specific training addresses real threats employees actually encounter. It’s relevant, practical, and immediately applicable.

The Simulation Strategy That Actually Works

Denisha takes realism one step further at CMS. Instead of theoretical scenarios, her team runs live, unannounced cyber attack simulations.

“No piece of paper can prepare you for the day it happens,” she warns. “We want to see how people behave under pressure, who freezes, who communicates, and who takes initiative.”

These simulations reveal gaps no policy document can predict. They show which employees need additional support and which departments aren’t ready for real attacks.

But the crucial part is that simulations only work when they educate rather than punish.

Why 90% of Employees Actually Want Phishing Tests

Despite negative stereotypes, recent surveys show 90% of employees find phishing simulations valuable. They recognize these tests improve their security awareness and help them identify real threats.

The stigma exists because many companies implement simulations wrong. They use unrealistic scenarios designed to trick rather than teach. They focus on catching failures instead of preventing them.

Effective phishing programs follow five principles:

  • Make scenarios realistic and job-relevant
  • Provide immediate, constructive feedback
  • Offer timely follow-up training
  • Maintain transparency about the program’s purpose
  • Reward employees who report suspicious activity

Companies following these guidelines see dramatic improvements. Before training, global phishing click rates average 34.3%. After 12 months of proper simulation-based training, this drops to just 4.6%.

The Recovery Plan Nobody Talks About

Even the best-trained employees make mistakes. Smart companies prepare for this reality instead of ignoring it.

“It’s not a matter of if you’ll be hacked, it’s when,” Pulana emphasizes. “We need clear plans that outline what happens in the event of a breach.”

Recovery readiness includes:

  • Clear communication protocols
  • Defined leadership roles during incidents
  • Step-by-step restoration procedures
  • Customer trust preservation strategies
  • Regular recovery simulations

At Avis Budget Group, recovery exercises test more than IT systems. They evaluate how all departments respond under pressure, ensuring company-wide coordination during real incidents.

Building Cyber Champions Inside Your Organization

Denisha discovered another powerful strategy: internal cyber champions. These aren’t IT professionals; they’re regular employees who become security advocates within their departments.

“When people hear about cyber issues from someone they work with daily, it feels more relatable,” she explains.

These champions serve multiple purposes:

  • Translate technical security concepts into everyday language
  • Identify department-specific vulnerabilities
  • Encourage colleagues to report suspicious activity
  • Reinforce training messages through informal conversations

The approach works because peer influence often carries more weight than top-down mandates.

Measuring What Matters Most

All three leaders emphasize the importance of tracking meaningful metrics. Traditional approaches count training completion rates or policy acknowledgments. These numbers miss the point entirely.

Better metrics include:

  • Phishing simulation click rates over time
  • Employee reporting of suspicious activity
  • Response times during security incidents
  • Department-specific vulnerability trends
  • Behavioural changes in daily security practices

Sibusiso uses dashboards to track these metrics across departments. “You can’t improve what you can’t measure,” he notes. “The board must have line of sight on where we stand, what risks are emerging, and how our people are responding.”

The Real-World Impact of Cultural Change

Visual impact often drives behavioural change more effectively than abstract warnings. At CMS, security teams show employees actual footage of companies during cyber attacks, servers going down, employees unable to work, and customers unable to access services.

“When employees see those consequences, the message sticks,” Denisha explains.

This approach connects daily actions to real-world outcomes. Employees understand that clicking suspicious links doesn’t just trigger a training module, but could shut down the entire company.

Making Board Members Care About Human Factors

Getting executive buy-in requires speaking their language. All three leaders recommend making cybersecurity a standing agenda item at board meetings.

The conversation should focus on:

  • Financial exposure from human error
  • Competitive risks from security incidents
  • Regulatory compliance requirements
  • Customer trust implications
  • Insurance and liability considerations

“Awareness has to start at the top,” Sibusiso emphasizes. Leadership commitment makes or breaks cultural transformation efforts.

The Future of Human-Centric Cybersecurity

Technology will continue evolving, but people remain the constant in cybersecurity equations. Artificial intelligence creates new threats and new defenses, but humans still make the critical decisions.

Companies winning the cybersecurity battle understand this fundamental truth. They invest in people alongside technology. They build cultures of collective responsibility rather than individual blame.

Your receptionist’s desk could indeed be your company’s downfall. But with the right approach, that same receptionist becomes your first line of defense. The difference lies not in the technology you deploy, but in the culture you create.

Every day you delay culture change is another day your biggest vulnerability remains unaddressed. The question isn’t whether you can afford to invest in human-centric cybersecurity, it’s whether you can afford not to.

Tags: cyber vigilancecybersecurity culturecybersecurity trainingdata breach preventionemployee traininghuman error cybersecurityinsider threatsphishing preventionsecurity awarenessworkplace security
ADVERTISEMENT
Previous Post

South Africa’s Tech Leaders Drop Truth Bomb: Diversity Isn’t Enough Anymore

Next Post

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

Faith Amonimo

Faith Amonimo

Recommended For You

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces
Event Radar Africa

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

by Faith Amonimo
October 24, 2025
0

At the 2025 IT Indaba, three prominent CIOs revealed how the traditional command-and-control approach is failing their teams. Their solution challenges everything companies think they know about managing remote workers....

Read moreDetails
South Africa’s Tech Leaders Drop Truth Bomb: Diversity Isn’t Enough Anymore

South Africa’s Tech Leaders Drop Truth Bomb: Diversity Isn’t Enough Anymore

October 24, 2025
Cybersecurity Strategies: Inside-Out Protection for Modern Businesses

Cybersecurity Strategies: Inside-Out Protection for Modern Businesses

October 23, 2025
Jessica Hope, Tobi Otokiti, Odunayo Eweniyi, FK Abudu, Lexi Novitske, Lola Masha & Other Brilliant Women You Should Meet at Moonshot 2025

From Feed to Fraud Prevention: SMEs Take Centre Stage at Moonshot 2025

October 20, 2025
IT Indaba 2025: Three IT Leaders Reveal the Career Secrets Tech Professionals Wish They Knew Earlier

IT Indaba 2025: Three IT Leaders Reveal the Career Secrets Tech Professionals Wish They Knew Earlier

October 17, 2025
Next Post
IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Subscribe to our Newsletter

Recent News

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

IT Indaba 2025: CIOs Demand Trust Over Control in Evolving Hybrid Workplaces

October 24, 2025
Why 95% of Cyber Attacks Start With Your Employees (And How Smart Companies Fix This)

Why 95% of Cyber Attacks Start With Your Employees (And How Smart Companies Fix This)

October 24, 2025
South Africa’s Tech Leaders Drop Truth Bomb: Diversity Isn’t Enough Anymore

South Africa’s Tech Leaders Drop Truth Bomb: Diversity Isn’t Enough Anymore

October 24, 2025
AI glasses usage

AI Glasses Are Redefining the Future of Mobile Entertainment

October 24, 2025
MultiChoice’s Best Bet to Retain Customers Lies in Pay-Per-View, Not Cheaper Decoders

MultiChoice’s Best Bet to Retain Customers Lies in Pay-Per-View, Not Cheaper Decoders

October 24, 2025

Where Africa’s Tech Revolution Begins – Covering tech innovations, startups, and developments across Africa

Facebook X-twitter Instagram Linkedin

Quick Links

Advertise on Techsoma

Publish your Articles

T & C

Privacy Policy

© 2025 — Techsoma Africa. All Rights Reserved

Add New Playlist

No Result
View All Result

© 2025 JNews - Premium WordPress news & magazine theme by Jegtheme.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?