Startup Security

Security Awareness Training: Building a Security-First Culture

How to build effective security awareness training programs — phishing simulations, training cadence, metrics that matter, and tools like KnowBe4 and Proofpoint.

March 9, 20267 min readShipSafer Team

Security Awareness Training: Building a Security-First Culture

Technical controls have limits. A perfectly configured firewall, a zero-trust network, and an endpoint detection platform all fail when an employee hands their credentials to an attacker who asked politely. Social engineering — phishing, vishing, pretexting — remains the initial access vector in the majority of successful breaches because humans are the most exploitable component in any security architecture.

Security awareness training isn't about making employees afraid. It's about making security intuitive enough that people do the right thing without thinking hard about it. That requires a program with structure, consistency, and feedback loops — not an annual video and a quiz.

Why Most Security Training Fails

The standard compliance-driven training program — a 45-minute video once a year, a passing quiz score, a checkbox in the HR system — produces compliance theater without behavior change. Employees watch the video, click through the quiz, and return to their desks unchanged.

Research on behavior change is clear: infrequent, passive information delivery doesn't produce durable behavior modification. What works is:

  • Spaced repetition: Short, frequent reinforcement beats long, rare sessions
  • Active learning: Simulated attacks and exercises create emotional engagement that lectures don't
  • Immediate feedback: Catching someone in a simulated phishing attempt right now is more effective than explaining phishing in the abstract six months ago
  • Relevance to role: A finance employee's threat model differs from an engineer's. Generic training ignores this.

Building a Training Program That Works

Baseline Assessment

Before training, measure where you are. Run a baseline phishing simulation without prior warning — not to shame employees, but to understand your click rate and reporting rate. These numbers set your improvement targets and make the case for the program internally.

A typical baseline for a company without prior phishing training: 20–40% of employees will click a simulated phishing link. After a mature training program, that number should drop to 5% or below.

Training Cadence

Monthly is the minimum for phishing simulations. Annual training is compliance theater. Quarterly security awareness modules are a reasonable floor for content training.

A realistic program:

  • Monthly: Phishing simulations (rotated templates — don't reuse the same lure)
  • Quarterly: 10–15 minute focused modules on a specific topic (credential hygiene, social engineering recognition, incident reporting)
  • Annually: A longer comprehensive review tied to policy attestation
  • Triggered: Immediate training for employees who click a phishing simulation

The triggered training is critical. When an employee clicks a simulated phishing link, the teachable moment is right now, not at the next quarterly training cycle.

Phishing Simulations: Doing Them Right

Phishing simulations exist to train, not to punish. Frame them accordingly. If employees fear disciplinary action for clicking a simulation, they'll hide real incidents when they happen — the opposite of what you want.

Effective simulation design:

  • Vary the templates: Use current events, vendor impersonation, internal IT requests, HR communications, and executive impersonation. Attackers don't send the same email twice.
  • Calibrate difficulty progressively: Start with more obvious phishing lures and increase sophistication as your click rate drops. The goal is training, not easy wins in your metrics.
  • Measure reporting rate, not just click rate: A culture where employees report suspicious emails is more valuable than one that simply doesn't click them. Reward reporting.
  • Include mobile scenarios: Smishing (SMS phishing) is increasingly common. Don't limit simulations to email.

Content Training Topics by Priority

Not all security topics matter equally for all roles. Prioritize by the actual threat vectors your organization faces:

Universal (all employees):

  1. Phishing recognition and reporting — the single highest-ROI topic
  2. Password hygiene and password manager adoption
  3. MFA: why it matters and how to avoid MFA fatigue attacks
  4. Social engineering recognition (pretexting, vishing, impersonation)
  5. Incident reporting — how to report something suspicious without fear

Engineering and DevOps:

  1. Secure coding basics relevant to your stack (OWASP Top 10)
  2. Secrets management — never hardcode credentials
  3. Dependency security and supply chain awareness
  4. Access control principles for systems they build

Finance and Executive:

  1. Business email compromise (BEC) — wire transfer and invoice fraud
  2. Whaling — targeted attacks against executives
  3. Verification procedures for financial requests

Tools and Platforms

Several platforms automate the delivery, simulation, and measurement of security awareness programs. Choosing the right one depends on your team size and maturity.

KnowBe4

The largest security awareness training platform by market share. Strengths include a vast library of phishing templates (10,000+), good reporting and analytics, and a well-integrated training content library. The platform's automated phishing simulation scheduling and "Phish-prone Percentage" tracking are widely used benchmarks.

Best for: Companies that want a comprehensive, proven platform with minimal setup. Strong compliance features make it popular at SOC2-focused companies.

Limitations: Content can feel dated. The volume of available content can overwhelm smaller teams trying to build a focused curriculum. Pricing scales with seats and starts around $15–25/user/year.

Proofpoint Security Awareness Training

Proofpoint's platform integrates well with their email security product, which is useful if you're already a Proofpoint customer. Their "Very Attacked People" (VAP) identification — surfacing which employees receive the most sophisticated targeted attacks — enables risk-based training prioritization.

Best for: Organizations already using Proofpoint for email security, and teams that want to tie simulation content to actual threats targeting their organization.

Hoxhunt

Hoxhunt takes a gamified approach — employees earn rewards for correctly identifying and reporting simulations. The game mechanics increase voluntary engagement and reinforce the reporting behavior you want to cultivate.

Best for: Engineering-heavy cultures where a competitive, gamified approach resonates better than traditional training.

Curricula (now Huntress Security Awareness Training)

A modern platform focused on short-form, story-driven content rather than traditional lecture-style modules. Content is genuinely engaging rather than compliance-checkbox material.

Best for: Early-stage companies that want training employees will actually complete, without the enterprise complexity of KnowBe4.

Metrics That Actually Matter

Avoid vanity metrics that demonstrate compliance but not behavior change.

Meaningful metrics:

  • Phish-prone percentage: The percentage of employees who click a simulated phishing link in a given period. Trend over time matters more than point-in-time measurements.
  • Reporting rate: The percentage of employees who report suspicious emails to your security team. This measures proactive security behavior.
  • Time to report: How quickly does a potential phishing email get reported? Fast reporting reduces dwell time in real attacks.
  • Repeat clickers: What percentage of employees click phishing simulations repeatedly? These individuals need additional intervention.
  • Training completion rate: Are employees actually completing training? Low completion rates indicate a program that isn't being enforced or engaged with.

Misleading metrics to avoid:

  • Training quiz pass rates (easy to click through without understanding)
  • Raw training completion counts without trend context
  • Self-reported confidence in security knowledge

Creating Psychological Safety Around Security

The most important cultural element in security awareness isn't training content — it's psychological safety. Employees must feel safe reporting mistakes without fear of punishment.

Establish explicitly that:

  • Clicking a real phishing email is not a fireable offense if reported promptly
  • Security questions are always welcome, regardless of how basic they seem
  • "I'm not sure if this is legitimate — let me verify" is the right answer to any unusual request

The goal is a workforce that acts as a distributed threat detection layer, not one that hides mistakes. An employee who reports a credential compromise within minutes dramatically reduces the blast radius of a breach. An employee who hides it for days because they fear punishment is far more dangerous than any technical vulnerability.

Measuring Culture Change

After 12 months of a structured awareness program, the cultural signals you're looking for:

  • Employees proactively ask the security team about suspicious communications
  • Engineering teams raise security concerns during design reviews without prompting
  • Leadership discusses security as a business asset, not just an IT cost
  • Reporting rate is higher than click rate in phishing simulations

These qualitative signals are as important as the quantitative metrics. Security culture is built slowly and can unravel quickly — it requires sustained investment and visible leadership commitment to maintain.

Check Your Security Score — Free

See exactly how your domain scores on DMARC, TLS, HTTP headers, and 25+ other automated security checks in under 60 seconds.