Training fatigue is common with increased transformation & compliance initiatives.

Security and privacy make up a fraction of the compliance training commitments required of employees. Placing additional training requirements on employees can impact corporate culture, including:

1. Distractions from productive work
2. Feelings of management being “out of touch” on workload
3. Minimal focus and attention on absorbing messages from training
4. Low participation in voluntary exercises like survey questionnaires

All of these consequences cause the important effort spent on corporate employee training and assessment, to be less effective.

Here are 3 ways that compliance and transformation initiatives can effectively engage employees without breaking the camel’s back:

MSPs have robust security systems.

Photo via Unsplash+

It’s been a “super-fantastic” experience to see people learning and talking about security threats.

For just $325 USD, you can run a 6 week, automated program for gamified phishing awareness training and challenges.  (Limited time offer. Normally valued at $999 USD)

Use Promo Code: 6WEEKS

1. Coordinate employee touch points and time budgets to avoid overlap
2. Spread all employees’ corporate training and communications evenly over time
3. Integrate messaging, assessment and feedback collection into short sessions

Whether it’s a “cyber security”, “digital transformation” or “environmental, social & governance” initiative, the projects can’t be implemented in a vacuum. We have to take into account all of the other commitments we require employees to make.

Look for ways to consolidate and optimize employee interactions across training and change initiatives.


Scott Wright is CEO of Click Armor, the gamified simulation platform that helps businesses avoid breaches by engaging employees to improve their proficiency in making decisions for cyber security risk and corporate compliance. He has over 20 years of cyber security coaching experience and was creator of the Honey Stick Project for Smartphones as a demonstration in measuring human vulnerabilities.