Start/Continue
Stop/Avoid
Customize for Context
Wildcard
100

Qualities to prioritise when hiring for better compliance include ______.

Positive security attitude and strong ethical orientation.

100

Rewards have ______ influence on policy compliance.

Weak.

100

Why should cybersecurity policies be tailored to employee context?

Uniform policies ignore cultural, regional and role differences, reducing effectiveness.

100

What proportion of data breaches stems from employee non-compliance?

More than half (over 50% of breaches).

200

Managers demonstrating commitment and allocating resources influence compliance through ______.

Leadership modelling and support.

200

Punishments often backfire because they ______.

Damage morale and foster an 'us vs them' culture.

200

Name one contextual factor that influences policy compliance.

Regional culture, job type, or generational norms.

200

What is the average cost of a data breach (IBM, 2019)?

$3.92 million.

400

Making compliance practical and providing quick support helps employees ______.

Follow through on intentions.

400

One technique cannot both improve compliance and reduce violations because ______.

They stem from different factors.

400

What evidence from the article supports customizing policies?

Interviews noted that policies are often seen as hindering productivity when not adapted to context.

400

Describe one real-world complaint about cybersecurity policies from the article.

Employees complained about too many password requirements and burdensome web filters slowing them down.