Iese

Logo Iese

Why your biggest cybersecurity risk isn’t technology — it’s your people

Use this framework to build a strong privacy culture, adding zero-trust behavioral safeguards to your technical defenses.

Office worker worried about a cyberattack
January 1, 2026

By Tawfiq Alashoor

In 2024, an employee in the Hong Kong office of the U.K.-based multinational firm Arup dutifully transferred £20 million to various accounts after being apparently asked to do so by the company CFO. Initially, when the employee received an email supposedly from the London office asking for the secret transactions to be made, he was rightfully suspicious. But then he held a videocall with the CFO and other staff he recognized, so he obliged. Only later it turned out the videocall was a deepfake using AI-generated voices and images, and the entire request was an elaborate scam. “Like many other businesses around the globe, our operations are subject to regular attacks, including invoice fraud and phishing scams,” a company spokesman said. “But the number and sophistication of these attacks has been rising.”

This story illustrates an important truth about cybersecurity, encapsulated in this testimony by convicted hacker Kevin Mitnick: “The human side of computer security is easily exploited and constantly overlooked. Companies spend millions of dollars on firewalls, encryption and secure access devices, and it is money wasted because none of these measures addresses the weakest link in the security chain — the people who use, administer, operate and account for computer systems that contain protected information.”

Consider this graphic:

There are ever-present cyber risks and threats, and companies try to mitigate their impact or avoid them altogether by applying access controls — literally controlling the access into the system. They do this by introducing a multitude of information technology (IT) and operational technology (OT) protections like encryption, firewalls, security protocols, two-factor authentication, backups, patches and so on. And while these layers upon layers of technical protection are absolutely essential, they are not enough because they do not address the human factor, which exists as its own layer.

This is why technical protections need to go hand-in-hand with managerial controls, which is the focus of this article. By managerial controls, we’re talking about more than providing employees with Security Education, Training & Awareness (SETA). Such programs teach employees the basics — don’t share passwords, update your software, don’t click on suspicious links — but they fail to address the potentially more serious errors that humans make in their everyday privacy decisions. No matter how rigorously you design the left side of the graphic to keep hackers out, all is for naught if you neglect the right side, and a gullible employee unwittingly invites hackers in through the back door. After all, it is easier to “log in” than “hack in.” So, where is your company focusing its effort?

In a recent IESE webinar on cybersecurity, I asked the audience: How often do you click “accept all” cookies when visiting websites? The majority said most of the time or sometimes, with less than a third saying they always rejected cookies. Although that rejection rate was higher than it used to be, it’s not as much as I think it should be, especially when you consider the other question I asked: Have you ever experienced or been affected by a cyberattack, personally or at work? The overwhelming answer was yes, and for the small minority who said no, it’s likely they had been breached but just weren’t aware of it yet. And as the Arup case shows, cyberattacks are growing ever more sophisticated, so no one can afford to let down one’s guard.

The vital importance of a privacy culture

What’s needed as much as SETA is PETA — Privacy Education, Training and Awareness. If, as studies estimate, 80% to 90% of breaches come down to human error, then companies need to pay as much attention to their human privacy culture as they do to their IT/OT systems.

A company’s privacy culture refers to the collective values, beliefs and practices that are deeply embedded in its operations and which guide how data management and the protection of personal information are approached and prioritized. It encompasses the attitudes and behaviors of employees at all levels of the company, emphasizing the importance of safeguarding privacy and personal data. It requires being proactive about upholding privacy standards, with company-wide training and a shared commitment to ensuring that data protection principles are integrated into all operations, decision-making processes and strategic objectives. That is why, in the graphic, privacy culture covers both the technical and managerial sides of a company’s security controls.

In research with colleagues in Brazil, Saudi Arabia, the United Kingdom and the United States, we developed a framework to support the development of a corporate privacy culture.

To establish a baseline understanding of privacy, we began by surveying over 1,000 employees across multiple departments (including sales, procurement, marketing, strategy and governance) and across various sectors (including manufacturing, technology, health, retail, e-commerce and sports clubs). We asked them a series of questions, first about their privacy expectations and then their perceptions of their company’s current practices. We also gauged their general behaviors (through statements such as “I know what to do if I notice or experience a security incident or data breach”) and assessed their responses to specific situations (through a series of “what would you do if…” types of questions). We also referenced existing legislation, such as the EU’s General Data Protection Regulation (GDPR). This yielded a composite index of 10 privacy culture pillars, summarized below.

Tawfiq Alashoor

Assistant Professor in the Department of Operations, Information & Technology at IESE Business School. His research focuses on privacy and cybersecurity, particularly managerial decision-making involving AI-supported technologies, as well as the analysis and design of management information systems (MIS).