Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed EDR

    Get full endpoint visibility, detection, and response

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Annual Security Awareness Training is a Waste of Time
Published:
December 17, 2020

Annual Security Awareness Training is a Waste of Time

By:
Team Huntress
Share icon
Glitch effectGlitch effectGlitch effect

It’s that time of year again. December is a time for the holidays. With that comes time to travel, eat great food, visit family & friends, and wrap up another year of great work. If you are like most organizations, you have some busy work to do as well. Complete your annual reviews, fill out healthcare forms, and make sure you complete your annual security awareness training. We are going to discuss the reasons why annual security awareness training is a complete waste of time for your company, your employees, and the security culture of your organization.

Why Annual Security Awareness Training?

Your employees receive an email stating, “complete required annual security awareness training.” What do you think their first reaction is? “This is a waste of time!” “Why do they do this to me every year?” “I am just going to click next as fast as I can!” “This is so cheesy.” Believe me, these are only some of the comments we can write on this blog, I am sure you have heard and experienced much worse.

Your company might have a compliance obligation or policy that states every employee must complete the required annual security awareness training. Sometimes you can’t get around this, but the implementation is wrong. You should first understand why you even have a security awareness policy in place. Think about it. Why would you have your employees complete any type of security awareness training? It is probably to help educate and train them on implementing and practicing better security behaviors, right? Your goal is to help change their behavior by following best practices to create a more secure environment.

[blockquote]Do you truly believe you are accomplishing that goal by delivering a once a year death by PowerPoint experience?[/blockquote]

Developing a Security Culture

Let’s take a look at security through a different lens. Imagine I am your fitness coach. My job is to help get you in shape, eat healthily, and become more health-conscious in your daily diet and exercise decisions. So what are we going to do? Well, how about this plan, I am going to get you on a treadmill and we are going to run for a half-hour while lifting weights all at the same time. Then right after that, we are going to eat a salad and drink a smoothie. Perfect, now I will just make you sign a document that said you have completed your fitness training. With that, I say that I will see you next year, same time, same place, same activity. Perfect, now you’ll be in great shape throughout the year because of this.

Absolutely not.

Let’s take a look at a better approach. I would meet with you to get an initial understanding of what your goals are. We would determine where you have had challenges with fitness and healthy eating in the past. We would then discuss a plan on how we are going to move forward. From there, we would establish a baseline of fitness for you. We would discuss healthy meal plans, exercise routines, and how to apply fitness in your everyday life. Then, we would also check in periodically and see how the plan is going and make adjustments based on any metrics we are gathering.

This concept is exactly how a security awareness program works. To build awareness, it must be spread out throughout the year in consumable, bite-sized conversations. Once a year security awareness training is great for checking a compliance box, but is completely ineffective when it comes to actually protecting your organization. Employees expect information in simple, clearly communicated language. Gradually educating employees throughout the year allows for an understanding of concepts similar to the way chapters in the book are broken out.

By spreading content throughout the year, you can focus your efforts on those concepts to be well understood by your employees. Overwhelming employees with information is like trying to cram for an exam. Cramming information might get you to pass the test, but we are not trying to only pass a test here. We are trying to change long term behaviors. We are trying to defend our organization from the continuous ongoing cyber threats and attacks our employees face every day. We are building a security culture.

Change is Not Built Overnight

Change is not accomplished overnight. It takes consistency and repetition to get it right. If you want to build a truly effective security awareness program, you cannot deliver a once a year death by PowerPoint and expect change. The effort you put into the program will be reflected by the output from the employees participating. If security is seen as a roadblock, it is your job to show that security should be part of their everyday practices. You need to show your employees how simple implementing security behaviors can be in their everyday lives.

Just like in the health example above, with just one annual session in the gym, you will not see an improvement. But, after several sessions and a repeatable routine of following the plan, you will see improvement. The same concept applies to your security awareness program. If you create a plan and follow that plan consistently with your employees, I promise you that change will occur. Employees will change their behaviors and security will become a part of your company culture. Change begins with a solid plan and continues with the drive to execute that plan.

If you are looking to make a change from your boring annual security awareness training to an immersive security awareness program, reach out we would love to help.

Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Texas HB 3834 Cyber Security Awareness Training Requirements

    Here's how to meet the Texas HB 3834 compliance requirement for a cybersecurity awareness training program for all contractors and employees.
  • What Is a Security Awareness Training Program?

    Improve security culture with a stronger security awareness program. Huntress Managed Security Awareness Training is designed to reduce incidents and protect your team.
  • CIS Controls Security Awareness Training

    Learn more about how Huntress' Managed Security Awareness Program can help your employees follow CIS control requirements.
  • NERC CIP Cyber Security Awareness Program

    CIP-004 R1 requires a NERC CIP Cyber Security Awareness Program for NERC entities. Low Impact Security Awareness Program requirement will also be discussed.
  • Security Awareness Training Will Prevent Ransomware

    Ransomware security awareness training is the most effective way to prevent a ransomware attack against your organization and its employees. Read more in the Huntress Blog to find out how.
  • Free Training Tool for Unlocked Computers

    Teach employees not to leave computers unlocked with this tool by Huntress, the fun cyber security awareness training provider.
  • Ditching FUD for FUN in Security Awareness Training

    Learn how to make security awareness training enjoyable and effective by ditching fear, uncertainty, and doubt (FUD) in the Huntress Blog.
  • Is There an Effective Way to Defend Against Cyber Threats to Critical Infrastructure?

    Learn about the current state of cyber threats to critical infrastructure and find out how state and local governments can protect against devastating breaches.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy