{"id":9319,"date":"2024-06-11T13:18:49","date_gmt":"2024-06-11T11:18:49","guid":{"rendered":"https:\/\/aboveit.fi\/engaging-users-in-cybersecurity-efforts\/"},"modified":"2025-11-27T14:03:53","modified_gmt":"2025-11-27T12:03:53","slug":"engaging-users-in-cybersecurity-efforts","status":"publish","type":"post","link":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/","title":{"rendered":"Engaging Users in Cybersecurity Efforts"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9319\" class=\"elementor elementor-9319 elementor-1855\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ec871b8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ec871b8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c3c378\" data-id=\"7c3c378\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-227df24 elementor-widget elementor-widget-text-editor\" data-id=\"227df24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>Have you ever wondered how to engage users in cybersecurity efforts? Cybersecurity is a vital part of an organization&#8217;s operations and competitiveness. Neglecting it can, at worst, temporarily interrupt operations or even paralyze them permanently. Human error is the biggest cause of security incidents. But how can organizations improve their resilience in cybersecurity regarding users, and how can they be engaged in it?    <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1922999 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1922999\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e1ce8a1\" data-id=\"e1ce8a1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6d2a4de elementor-widget elementor-widget-heading\" data-id=\"6d2a4de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Making Training Part of Everyday Life<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-41978ea elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"41978ea\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e140259\" data-id=\"e140259\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0c54e0 elementor-widget elementor-widget-text-editor\" data-id=\"a0c54e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In some organizations, cybersecurity training is still handled by providing a bundle of security guidelines along with other onboarding materials for reading during the induction process, and the matter may not have been revisited in any way since. Some employees may have several years passed since they last received training in cybersecurity. The guidelines may not have been reviewed since the creation of the first published version and thus contain outdated information.  <\/p>\n<p>Today, there are many different cybersecurity training systems available for organizations. The most popular are training systems built around simulated phishing messages, which often include short, continuous micro-training on various aspects of cybersecurity in addition to email phishing simulation messages. The core operating principle of these systems is regular, continuous training, so that things are not forgotten and users&#8217; awareness is maintained.  <\/p>\n<p>Matt Linton from Google wrote a <a href=\"https:\/\/security.googleblog.com\/2024\/05\/on-fire-drills-and-phishing-tests.html\">blog post<\/a> some time ago that also made news here in Finland, where he criticized the usefulness of email phishing message simulations. I agree with him that training where simulated phishing messages are sent to users without reporting features is not an effective method. When a user clicks on a link in a simulation message, they receive a cybersecurity training package and disapproval from the IT department. Not a very optimal way to engage users. Those systems where reporting features are available and reporting is rewarded engage users in joint cybersecurity efforts &#8211; whether it&#8217;s about practice simulations or real phishing messages.    <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b6a9e6a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b6a9e6a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c44791a\" data-id=\"c44791a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-684ee95 elementor-widget elementor-widget-heading\" data-id=\"684ee95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What About the Organization's Own Cybersecurity Guidelines?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-557f167 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"557f167\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9475795\" data-id=\"9475795\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6ba0b9e elementor-widget elementor-widget-text-editor\" data-id=\"6ba0b9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Often, the situation is that cybersecurity training materials are located somewhere in SharePoint file libraries, and there is no tracking of which users have acknowledged reading the materials and when it happened. Also, almost without exception, it is not possible to import the organization&#8217;s own internal training materials into the aforementioned phishing message training systems. <\/p>\n<p>The Finnish software company Agendium has an excellent solution for this. Their product called <a href=\"https:\/\/www.digiturvamalli.fi\/\">Digiturvamalli<\/a> (Digital Security Model) is a cybersecurity management system that can comprehensively manage cybersecurity in organizations. One aspect of the system is the maintenance, publication, and monitoring of cybersecurity guidelines for the organization&#8217;s users. With the system, guidelines stay up-to-date and can be brought as tasks for users to acknowledge, for example, through Microsoft Teams.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa86a39 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa86a39\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89a8ba9\" data-id=\"89a8ba9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2c162c elementor-widget elementor-widget-heading\" data-id=\"c2c162c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What Constitutes Good Cybersecurity Practices from the Users' Perspective in an Organization?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f063c62 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f063c62\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74a91cde\" data-id=\"74a91cde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-788def6f elementor-widget elementor-widget-text-editor\" data-id=\"788def6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\n<div class=\"section-wrapper\" data-id=\"rOmPTq\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-rOmPTq layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-M9OzWF\">\n<div class=\"sticky-wrapper\" data-id=\"M9OzWF\">\n<div class=\"guten-column-wrapper\">\n<div class=\"section-wrapper\" data-id=\"JyUaUf\">\n<section class=\"wp-block-gutenverse-section guten-element guten-section guten-JyUaUf layout-boxed align-stretch\">\n<div class=\"guten-container guten-column-gap-default\">\n<div class=\"wp-block-gutenverse-column guten-element guten-column guten-A1v7Uw\">\n<div class=\"sticky-wrapper\" data-id=\"A1v7Uw\">\n<div class=\"guten-column-wrapper\">\n<ul>\n<li>Management Commitment\n<ul>\n<li>The implementation of cybersecurity culture must come from management<\/li>\n<\/ul>\n\n<ul>\n<li>Without genuine management commitment to cybersecurity, it is very difficult to create a successful cybersecurity culture in the organization<\/li>\n<\/ul>\n<\/li>\n\n<li>Cybersecurity Strategy\n<ul>\n<li>Identify what external and internal requirements our organization faces<\/li>\n<\/ul>\n<ul>\n<li>Implement cybersecurity systematically, for example, by following a framework such as ISO27001, even if it&#8217;s not specifically required of us<\/li>\n<\/ul>\n\n<ul>\n<li>Clear explanations and review for users on why things are done and how they affect the organization and its employees<\/li>\n<\/ul>\n<\/li>\n\n<li>Implement a Cybersecurity Management System\n<ul>\n<li>Clarifies and helps the organization in systematic cybersecurity development<\/li>\n<\/ul>\n<\/li>\n\n<li>Continuous Phishing Message and Cybersecurity Micro-training for Users\n<ul>\n<li>Helps users identify and report genuine phishing messages<\/li>\n<\/ul>\n\n<ul>\n<li>Brings continuous awareness to users regarding cybersecurity<\/li>\n<\/ul>\n<\/li>\n\n<li>Engage the organization&#8217;s employees in joint efforts to improve cybersecurity\n<ul>\n<li>Make Reporting Cybersecurity Observations as Easy as Possible for Users<\/li>\n<\/ul>\n\n<ul>\n<li>Reward, Don&#8217;t Punish for Participation!<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n<p>It&#8217;s a clich\u00e9, but true. An organization&#8217;s level of cybersecurity is only as strong as its weakest link. And almost without exception, the biggest risk is our human behavior. By engaging users in joint cybersecurity efforts, we significantly reduce this risk.   <\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8daf78c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8daf78c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6cead24\" data-id=\"6cead24\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-07cb47f elementor-widget elementor-widget-text-editor\" data-id=\"07cb47f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><em>At Above IT, we help organizations create a successful cybersecurity culture. Contact us below and let&#8217;s talk more! <\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Have you ever wondered how to engage users in cybersecurity efforts? Cybersecurity is a vital part of an organization&#8217;s operations and competitiveness. Neglecting it can, at worst, temporarily interrupt operations or even paralyze them permanently. Human error is the biggest cause of security incidents. But how can organizations improve their resilience in cybersecurity regarding users, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":9321,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[218,331,255,354],"tags":[400,402,401],"class_list":["post-9319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-information-work-and-communication","category-management","category-modern-workplace","tag-digital-security-model","tag-simulation","tag-training"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Engaging Users in Cybersecurity Efforts - Above IT Oy<\/title>\n<meta name=\"description\" content=\"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Engaging Users in Cybersecurity Efforts - Above IT Oy\" \/>\n<meta property=\"og:description\" content=\"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/\" \/>\n<meta property=\"og:site_name\" content=\"Above IT Oy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aboveitfi\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-11T11:18:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-27T12:03:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mika Hakkarainen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mika Hakkarainen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/\"},\"author\":{\"name\":\"Mika Hakkarainen\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/042286daab0cbba998398a365b01589d\"},\"headline\":\"Engaging Users in Cybersecurity Efforts\",\"datePublished\":\"2024-06-11T11:18:49+00:00\",\"dateModified\":\"2025-11-27T12:03:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pexels-olly-3931607-scaled-1.jpg\",\"keywords\":[\"digital security model\",\"Simulation\",\"Training\"],\"articleSection\":[\"Cybersecurity\",\"Information Work and Communication\",\"Management\",\"Modern Workplace\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/\",\"name\":\"Engaging Users in Cybersecurity Efforts - Above IT Oy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pexels-olly-3931607-scaled-1.jpg\",\"datePublished\":\"2024-06-11T11:18:49+00:00\",\"dateModified\":\"2025-11-27T12:03:53+00:00\",\"description\":\"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pexels-olly-3931607-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/pexels-olly-3931607-scaled-1.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/engaging-users-in-cybersecurity-efforts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Etusivu\",\"item\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Engaging Users in Cybersecurity Efforts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"name\":\"We Are Above IT\",\"description\":\"Tietohallinnon voimavarakumppani\",\"publisher\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#organization\",\"name\":\"Above IT Oy\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"contentUrl\":\"https:\\\/\\\/aboveit.fi\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/aboveIT-logo.png\",\"width\":1613,\"height\":383,\"caption\":\"Above IT Oy\"},\"image\":{\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/aboveitfi\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/aboveitfi\",\"https:\\\/\\\/instagram.com\\\/aboveitfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/#\\\/schema\\\/person\\\/042286daab0cbba998398a365b01589d\",\"name\":\"Mika Hakkarainen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g\",\"caption\":\"Mika Hakkarainen\"},\"sameAs\":[\"https:\\\/\\\/aboveit.fi\"],\"url\":\"https:\\\/\\\/aboveit.fi\\\/en\\\/author\\\/mika-hakkarainenaboveit-fi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Engaging Users in Cybersecurity Efforts - Above IT Oy","description":"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/","og_locale":"en_US","og_type":"article","og_title":"Engaging Users in Cybersecurity Efforts - Above IT Oy","og_description":"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.","og_url":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/","og_site_name":"Above IT Oy","article_publisher":"https:\/\/www.facebook.com\/aboveitfi","article_published_time":"2024-06-11T11:18:49+00:00","article_modified_time":"2025-11-27T12:03:53+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg","type":"image\/jpeg"}],"author":"Mika Hakkarainen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mika Hakkarainen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#article","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/"},"author":{"name":"Mika Hakkarainen","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/042286daab0cbba998398a365b01589d"},"headline":"Engaging Users in Cybersecurity Efforts","datePublished":"2024-06-11T11:18:49+00:00","dateModified":"2025-11-27T12:03:53+00:00","mainEntityOfPage":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/"},"wordCount":672,"publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"image":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg","keywords":["digital security model","Simulation","Training"],"articleSection":["Cybersecurity","Information Work and Communication","Management","Modern Workplace"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/","url":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/","name":"Engaging Users in Cybersecurity Efforts - Above IT Oy","isPartOf":{"@id":"https:\/\/aboveit.fi\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#primaryimage"},"image":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#primaryimage"},"thumbnailUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg","datePublished":"2024-06-11T11:18:49+00:00","dateModified":"2025-11-27T12:03:53+00:00","description":"How to engage users in cybersecurity efforts? Our expert and consigliere Mika Hakkarainen addressed this topic in his blog.","breadcrumb":{"@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#primaryimage","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/06\/pexels-olly-3931607-scaled-1.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/aboveit.fi\/en\/engaging-users-in-cybersecurity-efforts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Etusivu","item":"https:\/\/aboveit.fi\/en\/"},{"@type":"ListItem","position":2,"name":"Engaging Users in Cybersecurity Efforts"}]},{"@type":"WebSite","@id":"https:\/\/aboveit.fi\/en\/#website","url":"https:\/\/aboveit.fi\/en\/","name":"We Are Above IT","description":"Tietohallinnon voimavarakumppani","publisher":{"@id":"https:\/\/aboveit.fi\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aboveit.fi\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/aboveit.fi\/en\/#organization","name":"Above IT Oy","url":"https:\/\/aboveit.fi\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/","url":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","contentUrl":"https:\/\/aboveit.fi\/wp-content\/uploads\/2024\/10\/aboveIT-logo.png","width":1613,"height":383,"caption":"Above IT Oy"},"image":{"@id":"https:\/\/aboveit.fi\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/aboveitfi","https:\/\/www.linkedin.com\/company\/aboveitfi","https:\/\/instagram.com\/aboveitfi"]},{"@type":"Person","@id":"https:\/\/aboveit.fi\/en\/#\/schema\/person\/042286daab0cbba998398a365b01589d","name":"Mika Hakkarainen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a524f3c964200b71dc33386439da51c4b3f74947e2015c221f4c90e36fec5096?s=96&d=mm&r=g","caption":"Mika Hakkarainen"},"sameAs":["https:\/\/aboveit.fi"],"url":"https:\/\/aboveit.fi\/en\/author\/mika-hakkarainenaboveit-fi\/"}]}},"_links":{"self":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/comments?post=9319"}],"version-history":[{"count":7,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9319\/revisions"}],"predecessor-version":[{"id":9360,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/posts\/9319\/revisions\/9360"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media\/9321"}],"wp:attachment":[{"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/media?parent=9319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/categories?post=9319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aboveit.fi\/en\/wp-json\/wp\/v2\/tags?post=9319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}