Why No One Wants Another Awareness Training
Let’s get one thing straight: people aren’t ignoring security training because they don’t care. They’re ignoring it because they’re overwhelmed. In...
Cognitive overload isn’t a personal failing. It’s a design flaw.
And in cybersecurity, it’s fast becoming one of the most exploitable weaknesses in your entire organization.
We’ve trained employees to recognize phishing emails, report suspicious behavior, and “think before clicking.” We’ve added tools, dashboards, alerts, and compliance requirements. But we’ve also added friction. More logins. More steps. More alerts. More noise.
Now multiply that across hundreds of tools and thousands of moments per week. The result?
People aren’t ignoring security because they don’t care.
They’re overwhelmed—and they’re trying to survive their workday.
In cybersecurity, cognitive overload is the new breach point. And it’s time we treated it like one.
Cognitive overload occurs when the demands on an individual’s attention, memory, and processing ability exceed their available mental bandwidth. In cybersecurity, that means too many alerts, too many instructions, too many choices—and not enough clarity.
It’s not a theoretical concern. It’s behavioral risk, hiding in plain sight.
📉 88% of data breaches are caused by human error (Stanford Research, 2022).
🕔 Security incident response data shows a spike in successful phishing attacks around 4:59pm on Fridays (Cofense, 2024).
📊 Over 60% of employees report “security fatigue”—the mental exhaustion from trying to follow too many security rules (NIST Study, 2021).
When we overestimate what employees can reasonably process, we create the perfect storm for risky decisions.

Clicking a malicious link while multitasking. The employee was watching a Teams message, replying to an email, and juggling a Zoom call. The phishing email hit at the perfect moment—and got through.
Choosing weak or repeated passwords. After multiple MFA prompts, login timeouts, and password change alerts, fatigue wins over good hygiene.
Approving access requests without verifying. The brain, in a rush, prioritizes speed over caution—especially if the user looks familiar.
Bypassing security controls to meet a deadline. A critical file shared through personal Dropbox. A USB drive used at home. These aren’t malicious—they’re overburdened workarounds.
These aren’t just outliers. They’re the natural byproduct of a high-pressure environment paired with poor system design.
Attackers don’t just exploit ignorance—they exploit timing.
They know that human error rates increase when people are tired, distracted, or rushing to close out their day.
They phish on Friday afternoons.
They spoof routine vendor requests at the end of fiscal quarters.
They launch malware campaigns during big global news events.
And the results speak for themselves.
A 2024 report from KnowBe4 found phishing simulation failures increased by 37% on Friday afternoons.
In a SANS survey, 48% of security leaders said their teams missed at least one social engineering attempt due to overload or alert fatigue in the past year.
Fatigue cycles aren’t a side effect—they’re a primary vector.
Too many security programs still measure success by checkboxes:
✅ Mandatory training completed
✅ Annual phishing test delivered
✅ Security reminders sent
But when employees are cognitively overloaded, they aren’t learning—they’re surviving.
They skim.
They click just to move on.
They forget.
And worst of all, they stop caring.
This false sense of compliance creates a dangerous illusion: it looks like your program is working, until it fails.

If you want fewer mistakes, design a system where the right action is the easy one. Start here:
Reduce duplicate alerts. Consolidate notifications. Eliminate unnecessary choices.
Give clear next steps, not long policy documents. Fewer choices = fewer chances to fail.
The best security behavior is one the user never has to think about.
Map your security touchpoints against a real user journey. Understand context. Remove friction.
Instead of annual firehose training, use short nudges, simulations, and moments of reflection that align with the actual risk landscape.
Human error isn’t just an individual mistake—it’s a systemic signal.
Cognitive overload exposes where your program is too complex, too noisy, or too detached from the lived reality of your workforce.
If we want secure behavior to stick, we need to focus less on adding layers of awareness and more on reducing the cognitive debt we ask people to carry.
And that’s where human-centric cybersecurity takes the lead.
Let’s get one thing straight: people aren’t ignoring security training because they don’t care. They’re ignoring it because they’re overwhelmed. In...
3 min read
If you've ever sat in a meeting and heard the phrase, "Our people are the weakest link," you may have nodded along in agreement. It's become a go-to...
4 min read
When most people think about cybersecurity, they think of firewalls, encryption, and maybe a training module or two. But beneath the surface of every...
8 min read
Subscribe to our newsletters for the latest news and insights.
Stay updated with best practices to enhance your workforce.
Get the latest on strategic risk for Executives and Managers.