Policies Without People: Why Staff Behaviour Remains the Leading Cause of DataBreaches

by

Your organisation may pass every audit, satisfy every documented requirement and still be fundamentally exposed. The difference between a documented compliance posture and genuine security lies in a variable that audit cycles were never designed to measure: how your people actually behave.

Ask most Data Protection Officers how their organisation manages human risk and they will describe a training program. Ask them when staff last completed it and the answer is usually: annually. Ask them what changed in employee behaviour afterwards and the answer is and the answer is often less clear.

This is the behavioural slump—one of the defining compliance gaps of the current regulatory era.

Organisations have invested heavily in the architecture of data protection—policies, registers, privacy notices, and technical controls—while underinvesting in the one variable that carries the most weight: human behaviour under pressure. Not behaviour in theory, but behaviour at 6:42pm on a Friday, when an employee approves a “CEO request” while juggling deadlines and a full inbox.

The result is not a documentation failure. It is a governance illusion.

The Compliance Posture That Audit Cycles Cannot Reach

Most organisations understand, in theory, that people represent the most unpredictable element in their data protection model. But theory rarely survives operational reality. Technical controls cannot eliminate human error. Occasional reminders cannot build a privacy culture. And training programmes—too often—become periodic, generic, tick-box exercises measured by completion rather than outcome.

Verizon’s 2024 Data Breach Investigations Report, covering over 10,600 confirmed breaches across 94 countries, found that 68% involved a non-malicious human element: an employee who clicked, misconfigured, misdirected, or was deceived (Verizon, 2024). That figure has not meaningfully declined in five years of consistent measurement. In the same period, the global average cost of a data breach rose to USD 4.88 million in 2024 the steepest increase since the pandemic. (IBM, 2024). This is not an awareness problem, it is because their current control models do not influence behaviour at the point of decision-making.

Consider a common scenario.

A finance officer receives an email appearing to come from the CEO requesting urgent approval for a vendor payment. The tone is familiar. The timing is inconvenient—late in the day, with multiple deadlines competing for attention.

The employee has completed annual data protection training. They are aware of phishing risks. But in that moment, speed, authority, and context outweigh recall. The payment is approved.

No system was breached. No policy was absent. The failure occurred at the exact point where compliance frameworks assume behaviour will align with training

That assumption is where many organisations remain exposed.

What the Breach Data Actually Reveals About Your People

There is a tendency to frame the human element in breaches as an insider threat problem driven by malicious employees. The data does not support that view.

Social engineering, principally phishing and business email compromise (BEC) does not exploit technical vulnerabilities. It exploits human instincts such as urgency, authority, familiarity. Many attacks succeed without malicious links or attachments. A well-worded email asking for “urgent vendor payment approval” is often enough. Over 40% of social engineering attacks captured in the Verizon 2024 dataset were impersonation attacks without malicious link or attachment (SANS Institute, 2024). They succeeded not because employees are careless, but because they are operating in real conditions—tight deadlines, high volume, competing priorities—where compliance is treated as something that happens during training, not in the moment.

Human error including misconfiguration, misdirected emails, improper data disposal now accounts for a significant share of breaches as operational environments have grown more complex and employees are expected to work faster across more platforms simultaneously (Verizon, 2024). These are not failures of character. They are patterned behaviours occurring in specific roles, under specific conditions. And patterns can be measured. Which means they can be managed.

Perhaps the most instructive finding in the 2025 Verizon DBIR is this: risk is not evenly distributed. A small subset of employees accounts for a disproportionate share of risky actions. Yet most organisations still deploy uniform training across their entire workforce.

That mismatch is where exposure lives.

Why Your Training Programme Is Probably Not Working

A 2024 meta-analysis of 69 cybersecurity training studies found that training improves awareness, but has limited impact on behaviour. Organisations have become effective at changing what people know. They have not become effective at changing what people do.

The problem is structural:

● Annual training treats data protection as an event, not a practice
● Generic content ignores role-specific risk
● Completion metrics replace behavioural metrics

A business development manager handling third-party data faces a different risk profile from a systems administrator managing access controls. Training that does not reflect that distinction serves neither.

More importantly, when training competes with everyday job pressure, it is consistently deprioritised. When an employee is rushing to close a deal or clear an inbox, convenience often wins over compliance, regardless of what a training module told them six months ago (Frontiers in Psychology, 2023). The CISA has explicitly recommended role-based, contextual, and continuous training for this reason: relevance and proximity to real decisions are what drive retention and behaviour change (CISA Cybersecurity Training Guide).

There is also the problem of security fatigue. As compliance obligations multiply and security systems generate constant alerts, employees develop coping mechanisms such as ignoring warnings, circumventing controls, defaulting to convenience. If you have not measured this behaviour, you do not know how much of your compliance posture exists only on paper.

What Regulators Are Beginning to Scrutinise

Regulators across jurisdictions are no longer satisfied with evidence that training occurred. They are increasingly interested in what it produces.

Under the EU General Data Protection Regulation, Article 39 assigns the Data Protection Officer ongoing responsibility for awareness-raising and staff training not as a periodic event but as a continuous governance function. Under the Nigeria Data Protection Act 2023 and its General Application and Implementation Directive (GAID, 2025), Article 31 prescribes a Schedule for Internal Sensitisation and Training on Privacy, requiring documented, periodic internal training programmes maintained throughout the year. The GAID, 2025 specifies that the DPO must assign responsibilities, raise awareness, and train staff involved in personal data processing as part of the organisation’s embedded compliance infrastructure (ICLG, 2025).

Crucially, these obligations do not position the DPO as the subject of training, but as its architect. The regulatory expectation is not that one role is compliant, but that all roles interacting with personal data behave in ways that reflect that compliance in practice.

For organisations operating across multiple jurisdictions and sector-specific frameworks, this has practical implications. A single annual training module for all staff regardless of their roles is unlikely to meet the standard regulators are beginning to enforce.

Regulators are increasingly examining the substance, frequency, and demonstrable impact of training programmes. The Nigeria Data Protection Commission’s move from advisory guidance to sector-wide investigations and administrative penalties signals precisely this trajectory.

The question is shifting—from:

“Did you train your staff?”

to:

“What changed because you did?”

That is a much harder question to answer.

From Compliance Exercise to Competitive Differentiator

Shifting from awareness-based training to behaviour-centred risk management does more than reduce breach exposure. It creates a measurable governance advantage. A workforce that instinctively questions unusual requests, reports incidents early and applies privacy thinking in real time becomes a control layer that no policy document can replicate.

This is a competitive advantage. Data protection is now a factor in procurement, partnerships and investment decisions. Organisations that can demonstrate effective human-layer governance stand out—not because they claim compliance, but because they can evidence it.

The IBM 2024 Cost of a Data Breach Report found that organisations with robust training investment and security culture programmes incurred an average of $2.2 million less per breach than those without (IBM, 2024).The financial case is equally clear. Organisations with mature security culture programmes consistently incur lower breach costs.

In practice, this means treating human behaviour as something that can be observed, tested, and measured—not assumed.

For example, rather than asking whether staff completed training, organisations begin to track:

● how different roles respond to simulated phishing attempts under realistic conditions
● how frequently high-risk actions (e.g., misdirected emails or incorrect data sharing) occur, and in which teams
● how quickly employees report suspected incidents
● where security controls are routinely bypassed for convenience

Over time, patterns emerge

Risk is no longer abstract or evenly distributed—it becomes visible, concentrated, and actionable. Training is then redesigned around those patterns, rather than deployed uniformly across the organisation.

This is the model T.A.A.S Cyber Solutions Ltd applies in practice, working with organisations across Africa, Europe, and the United States to move beyond documented compliance toward measurable behavioural outcomes.

If your current compliance posture cannot demonstrate what your training has changed, then the exposure is not theoretical. It is operational.

Bibliography

CISA. (n.d.). Cybersecurity training and exercises. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov/cybersecurity-training-exercises

IBM. (2024). Cost of a data breach report 2024. Ponemon Institute / IBM Security. https://www.ibm.com/reports/data-breach

ICLG. (2025). Data protection laws and regulations: Nigeria 2025–2026. International Comparative Legal Guides. https://iclg.com/practice-areas/data-protection-laws-and-regulations/nigeria

Nigeria Data Protection Commission. (2025). Nigeria Data Protection Act General Application and Implementation Directive (GAID). NDPC. https://ndpc.gov.ng

Prümmer, J., van Steen, T., & van den Berg, B. (2024). A systematic review of current cybersecurity training methods. Computers & Security, 136, 103585. https://doi.org/10.1016/j.cose.2023.103585

SANS Institute. (2024). Tackling modern human risks in cybersecurity: Insights from the Verizon DBIR 2024. SANS Institute Blog. https://www.sans.org/blog

Topsec Cloud Solutions. (2025). Why security awareness training needs to change. https://www.topsec.com/why-security-awareness-training-needs-to-change

Verizon. (2024). 2024 data breach investigations report (17th ed.). Verizon Business. https://www.verizon.com/business/resources/reports/dbir

Verizon. (2025). 2025 data breach investigations report (18th ed.). Verizon Business. https://www.verizon.com/business/resources/reports/dbir

The Jihadist Fight for West Africa (2020)

The jihadist ambition to establish a global Caliphate has suffered serious setbacks in the last two years. Daesh (Islamic State or IS) emerged as a more brutal and, with its territorial gains in Syria and Iraq, successful jihadist competitor to al-Qa’ida. Yet by...

Cyber threats on African subjects (2018)

Since 2015, security experts have forecasted government and commercial online services as the next frontier for illegal activity in Africa. The large gap in available data regarding cybercrime in Africa hinders effective counter measures, which is largely due to the...

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.