Blog
Your team members are helping the hackers!
Yes, you read that right. đ˛ The biggest threat to your organisation’s cybersecurity might not be a shadowy figure in a hoodie halfway across the world, it could be sitting right next to you in the office. Before you panic, letâs be clear, most employees arenât malicious. But through carelessness, lack of awareness, or simple human error, they can become unwitting accomplices to cybercriminals!
The human factor: Cybersecurity’s weakest link
Despite billions spent on firewalls, encryption, and endpoint protection, one vulnerability remains stubbornly persistent: people. According to numerous cybersecurity reports, 95% of data breaches involve human error*. That includes:
- Clicking on phishing emails
- Using weak or reused passwords
- Falling for social engineering scams
- Mishandling sensitive data
- Ignoring software updates
These arenât just minor slip-ups, theyâre open doors for hackers.

How it happens
Phishing Attacks
A single employee clicking on a fake invoice email can give attackers access to your entire network.
Password Mishaps
Using âPassword123â or writing login credentials on sticky notes is like handing over the keys to your digital kingdom.
Shadow IT
Employees installing unauthorised apps or using personal devices for work can bypass security protocols and create hidden vulnerabilities.
Why it happens
Most employees arenât trying to sabotage the company. Theyâre just trying to get their work done – fast! Security often feels like a barrier rather than a benefit. If training is boring, policies are confusing, or tools are clunky, people will find workarounds. And thatâs when the trouble starts.
What you can do about it
Make security everyoneâs job
đ Cybersecurity isnât just ITâs responsibility. Everyone from interns to executives needs to understand their role in protecting company data and networks.
Invest in engaging training
đŽ Ditch the dull PowerPoints. Use interactive simulations, gamified learning, and real-world scenarios to make training stick.
Foster a culture of security
đŁď¸ Encourage employees to report suspicious activity without fear of punishment. Celebrate good security behaviour.
Simplify security tools
âď¸ Make it easy for people to do the right thing. Use password managers, single sign-on, and automatic updates.
Test and improve
đ§Ş Run regular phishing simulations and security audits. Use the results to identify weak spots and improve your defences.
Your team can be your greatest asset, or your biggest liability when it comes to cybersecurity. The choice is yours. Empower them with the right knowledge, tools, and culture, and theyâll become your first line of defence instead of your weakest link.
Because the truth is, if youâre not training your team to protect your data, you might as well be training them to help the hackers.
Cyber Essentials
What you need to know

Do you know what the five security protocols are?
Find out in our comprehensive guide on Cyber Essentials providing you with all the information you need, from what Cyber Essentials is, to the key benefits of having it!
*Source: The State of Human Risk 2025 | Mimecast
Latest cybersecurity articles
- How to identify AI created content and its cybersecurity implicationsArtificial Intelligence (AI) has transformed content creation, enabling businesses and individuals to produce blogs, images, emails, and social media posts at scale. While this technology offers efficiency and creativity, it also introduces challenges.
- Your team members are helping the hackers!Yes, you read that right. đ˛ The biggest threat to your organisation’s cybersecurity might not be a shadowy figure in a hoodie halfway across the world, it could be sitting right next to you in the office.
- Novel Phishing CampaignThe scammers are at it again and this time that have developed a new way to get round SPAM filters.
- Why SMEs need to up their Cybersecurity gameIn an era where cyber threats are evolving at an unprecedented pace, small and medium-sized enterprises (SMEs) in the UK must prioritise robust IT support with integrated cybersecurity elements to safeguard their operations.
- Why should I get Backup for 365?We recommend backing-up your Microsoft 365 data to another cloud-based server, ensuring that if someone does get past the heavy security that we have set up or there are any internal human errors, we can quickly recover your data and make sure that your organisation keeps on running.
- Cyber Security Awareness monthWell it’s officially October which means its Cyber Security Awareness month and I know what you’re thinking “not another piece of sales material disguised as ‘awareness’ banging on about how AI will revolutionise the security of my business” – absolutely not!
- What on earth is NIS2?Another day, another weird tech acronym! This time itâs related to cybersecurity. NIS2 (Network and Information Security version 2) is the latest EU directive that aims to improve the cybersecurity and resilience of organisations that provide particular services.
- Why your business needs Cyber EssentialsYouâd be forgiven for thinking the end is nigh if you follow the news. Every day we see our streams updated with stories about household names being victims of cyber crime or new âcriticalâ vulnerabilities in applications and services.
- Things you didnt know you needed: Computer LockMake sure you don’t get pranked in the office, whenever you leave you laptop or computer at your desk!
- Whats good got to do with it? Security awareness trainingI recently went to the International Cyber Expo (ICE) for the first time and attended a talk by Dr Jason Nurse. The talk was on the study they conducted on the behaviours and attitudes towards Security Awareness Training.
- QR CodesCyber crooks are always on on the look out for new and effective ways to beat security systems and people to steal. There is a growing trend of criminals using QR codes as part of their phishing campaigns, specifically trying to steal Microsoft credentials.
- Microsoft 365 phishing attackThe cyber criminals are at it again! ? They are now using Microsoft’s Rights Management Services (RMS) to steal credentials!
- Hacked, scammed and deleted: A cybersecurity taleThe most tech savvy, security conscience business can be hit by a security breach.Are you prepared?
- Microsoft Outlook vulnerabilityYou may have seen in the news that Microsoft has identified a particularly nasty Outlook vulnerability.
- Being asked to install or update toolsAre you being asked to install or update one of our tools, are you sure it’s us!?
View all cybersecurity articles >

Jig Mehta
Is a Digital Marketing Manager at Select Technology, he has been part of the team for over 5 years, and has a keen interest in technology, whether its technical specs, cybersecurity or AI!