Qualities to prioritise when hiring for better compliance include ______.
Positive security attitude and strong ethical orientation.
Rewards have ______ influence on policy compliance.
Weak.
Why should cybersecurity policies be tailored to employee context?
Uniform policies ignore cultural, regional and role differences, reducing effectiveness.
What proportion of data breaches stems from employee non-compliance?
More than half (over 50% of breaches).
Managers demonstrating commitment and allocating resources influence compliance through ______.
Leadership modelling and support.
Punishments often backfire because they ______.
Damage morale and foster an 'us vs them' culture.
Name one contextual factor that influences policy compliance.
Regional culture, job type, or generational norms.
What is the average cost of a data breach (IBM, 2019)?
$3.92 million.
Making compliance practical and providing quick support helps employees ______.
Follow through on intentions.
One technique cannot both improve compliance and reduce violations because ______.
They stem from different factors.
What evidence from the article supports customizing policies?
Interviews noted that policies are often seen as hindering productivity when not adapted to context.
Describe one real-world complaint about cybersecurity policies from the article.
Employees complained about too many password requirements and burdensome web filters slowing them down.