Skip to page content
Client Hub Tel 01892 830111

Blog

Your team members are helping the hackers!

By Jig Mehta, Digital Marketing Manager | Published 28 Jul 2025

Yes, you read that right. 😲 The biggest threat to your organisation’s cybersecurity might not be a shadowy figure in a hoodie halfway across the world, it could be sitting right next to you in the office. Before you panic, let’s be clear, most employees aren’t malicious. But through carelessness, lack of awareness, or simple human error, they can become unwitting accomplices to cybercriminals!

The human factor: Cybersecurity’s weakest link

Despite billions spent on firewalls, encryption, and endpoint protection, one vulnerability remains stubbornly persistent: people. According to numerous cybersecurity reports, 95% of data breaches involve human error*. That includes:

  • Clicking on phishing emails
  • Using weak or reused passwords
  • Falling for social engineering scams
  • Mishandling sensitive data
  • Ignoring software updates

These aren’t just minor slip-ups, they’re open doors for hackers.

Are your team members helping the hackers - 95% of breaches involve human error

How it happens

Phishing Attacks

A single employee clicking on a fake invoice email can give attackers access to your entire network.

Password Mishaps

Using “Password123” or writing login credentials on sticky notes is like handing over the keys to your digital kingdom.

Shadow IT

Employees installing unauthorised apps or using personal devices for work can bypass security protocols and create hidden vulnerabilities.

Why it happens

Most employees aren’t trying to sabotage the company. They’re just trying to get their work done – fast! Security often feels like a barrier rather than a benefit. If training is boring, policies are confusing, or tools are clunky, people will find workarounds. And that’s when the trouble starts.

What you can do about it

Make security everyone’s job
🔐 Cybersecurity isn’t just IT’s responsibility. Everyone from interns to executives needs to understand their role in protecting company data and networks.

Invest in engaging training
🎮 Ditch the dull PowerPoints. Use interactive simulations, gamified learning, and real-world scenarios to make training stick.

Foster a culture of security
🗣️ Encourage employees to report suspicious activity without fear of punishment. Celebrate good security behaviour.

Simplify security tools
⚙️ Make it easy for people to do the right thing. Use password managers, single sign-on, and automatic updates.

Test and improve
🧪 Run regular phishing simulations and security audits. Use the results to identify weak spots and improve your defences.

Your team can be your greatest asset, or your biggest liability when it comes to cybersecurity. The choice is yours. Empower them with the right knowledge, tools, and culture, and they’ll become your first line of defence instead of your weakest link.

Because the truth is, if you’re not training your team to protect your data, you might as well be training them to help the hackers.

Cyber Essentials - What you need to know

Find out in our comprehensive guide on Cyber Essentials providing you with all the information you need, from what Cyber Essentials is, to the key benefits of having it!

*Source: The State of Human Risk 2025 | Mimecast

Latest cybersecurity articles

  • How to identify AI created content and its cybersecurity implications
    Artificial Intelligence (AI) has transformed content creation, enabling businesses and individuals to produce blogs, images, emails, and social media posts at scale. While this technology offers efficiency and creativity, it also introduces challenges.
  • Your team members are helping the hackers!
    Yes, you read that right. 😲 The biggest threat to your organisation’s cybersecurity might not be a shadowy figure in a hoodie halfway across the world, it could be sitting right next to you in the office.
  • Novel Phishing Campaign
    The scammers are at it again and this time that have developed a new way to get round SPAM filters.
  • Why SMEs need to up their Cybersecurity game
    In an era where cyber threats are evolving at an unprecedented pace, small and medium-sized enterprises (SMEs) in the UK must prioritise robust IT support with integrated cybersecurity elements to safeguard their operations.
  • Why should I get Backup for 365?
    We recommend backing-up your Microsoft 365 data to another cloud-based server, ensuring that if someone does get past the heavy security that we have set up or there are any internal human errors, we can quickly recover your data and make sure that your organisation keeps on running.
  • Cyber Security Awareness month
    Well it’s officially October which means its Cyber Security Awareness month and I know what you’re thinking “not another piece of sales material disguised as ‘awareness’ banging on about how AI will revolutionise the security of my business” – absolutely not!
  • What on earth is NIS2?
    Another day, another weird tech acronym! This time it’s related to cybersecurity. NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services.
  • Why your business needs Cyber Essentials
    You’d be forgiven for thinking the end is nigh if you follow the news. Every day we see our streams updated with stories about household names being victims of cyber crime or new ‘critical’ vulnerabilities in applications and services.
  • Things you didnt know you needed: Computer Lock
    Make sure you don’t get pranked in the office, whenever you leave you laptop or computer at your desk!
  • Whats good got to do with it? Security awareness training
    I recently went to the International Cyber Expo (ICE) for the first time and attended a talk by Dr Jason Nurse. The talk was on the study they conducted on the behaviours and attitudes towards Security Awareness Training.
  • QR Codes
    Cyber crooks are always on on the look out for new and effective ways to beat security systems and people to steal. There is a growing trend of criminals using QR codes as part of their phishing campaigns, specifically trying to steal Microsoft credentials.
  • Microsoft 365 phishing attack
    The cyber criminals are at it again! ? They are now using Microsoft’s Rights Management Services (RMS) to steal credentials!
  • Hacked, scammed and deleted: A cybersecurity tale
    The most tech savvy, security conscience business can be hit by a security breach.Are you prepared?
  • Microsoft Outlook vulnerability
    You may have seen in the news that Microsoft has identified a particularly nasty Outlook vulnerability.
  • Being asked to install or update tools
    Are you being asked to install or update one of our tools, are you sure it’s us!?

View all cybersecurity articles >

Jig Mehta

Jig Mehta

Is a Digital Marketing Manager at Select Technology, he has been part of the team for over 5 years, and has a keen interest in technology, whether its technical specs, cybersecurity or AI!


Let's get started

Book a call today to discuss
how we can work together.

Book a call Let's talk
Contact Us