Susan Regularly Violates Her Organization'S Security Policies: Complete Guide

10 min read

When Employees Ignore the Rules: Understanding and Addressing Security Policy Violations

Imagine this: your IT team rolls out multi-factor authentication, sends multiple reminders, and even runs a training session. She's been warned twice. Even so, then you find out Susan in accounting logged in from a public WiFi network using her personal laptop — again. This isn't ignorance anymore; it's a pattern.

This is the reality for thousands of organizations. Which means security policies exist for a reason, yet employees like Susan routinely sidestep them, often without understanding the real consequences. And here's what makes it tricky — Susan probably isn't trying to cause harm. She's just made security a lower priority than getting her work done.

That's exactly what we're going to unpack here: why employees violate security policies, what that actually costs organizations, and what actually works to fix it Most people skip this — try not to..

What Security Policy Violations Actually Look Like

Let's get specific. A security policy violation is any action — or failure to act — that goes against the rules your organization has put in place to protect its data, systems, and networks. These policies typically cover things like password management, data handling, device usage, network access, and physical security.

This is where a lot of people lose the thread Worth keeping that in mind..

In Susan's case, the violations might include:

  • Using her personal device for work files without approval
  • Sharing passwords with a colleague "just this once"
  • Leaving her computer unlocked while grabbing coffee
  • Clicking on a phishing link and not reporting it
  • Downloading unauthorized software because "it was easier"
  • Ignoring software update reminders for weeks

Here's what most people miss: not all violations are equal. Because of that, there's a difference between an employee who genuinely doesn't know the rule and someone who knows and chooses to ignore it. Susan has been reminded multiple times, so she's in the second category. That's a different problem that requires a different approach.

Not the most exciting part, but easily the most useful.

The Insider Threat Spectrum

Security experts often talk about the insider threat spectrum. On one end, you have accidental insiders — people who make mistakes without realizing it. Day to day, on the other end, you have malicious insiders who deliberately cause harm. Susan probably falls somewhere in the middle, which is actually the most common situation.

These employees aren't trying to hurt the company. They're just prioritizing convenience over security, or they genuinely don't see how their behavior creates risk. This is sometimes called "negligent" insider threat, and it's responsible for a huge percentage of security incidents It's one of those things that adds up. And it works..

Why It Matters — More Than You Might Think

You might be tempted to write off Susan's behavior as harmless. Which means it's not. Here's why.

The Real Cost of Policy Violations

One stolen credential — whether through a phishing attack that succeeded because someone used their work email on a sketchy site, or because someone left their password on a sticky note — can open the door to ransomware, data breaches, regulatory fines, and reputational damage.

The 2023 IBM Cost of a Data Breach report found that the average breach cost over $4 million. And here's the kicker: many of these breaches started with something simple, like a weak password or an unpatched system. That's Susan's world.

Regulatory and Legal Consequences

If your organization handles sensitive data — customer information, healthcare records, financial data — you likely have legal obligations around how that data is protected. So when employees violate security policies, they put the organization at risk of non-compliance. That can mean fines, audits, and legal liability.

Susan might not know that her behavior could trigger a compliance violation. But ignorance doesn't excuse it in the eyes of regulators.

The Cultural Contagion Effect

Here's something leaders often overlook: when one employee repeatedly violates security policies without consequence, others notice. So security culture isn't built by policies on paper — it's built by what people see happening around them. If Susan keeps getting away with it, why should anyone else take the rules seriously?

At its core, why addressing policy violations isn't just about Susan. It's about the message sent to everyone else It's one of those things that adds up. That's the whole idea..

How Organizations Handle Repeated Violations

Now let's get into what actually works. This is where most guides fall short because they treat every situation the same. It doesn't work that way Not complicated — just consistent..

Step 1: Understand the Motivation

Before you escalate, you need to understand why Susan keeps violating policies. Is it:

  • Lack of awareness? She genuinely doesn't know the rule or why it exists.
  • Inconvenience? She knows the rule but finds it too cumbersome.
  • Risk blindness? She doesn't believe the threat is real.
  • Technical barriers? The policy requires something she can't actually do with her equipment.
  • Intentional defiance? She's decided the rules don't apply to her.

Each of these requires a different response. Worth adding: if Susan doesn't understand why multi-factor authentication matters, another warning email won't help. If she's intentionally defying rules, that's a disciplinary issue.

Step 2: Document Everything

This sounds bureaucratic, but it's essential. When was the employee informed? Every conversation about policy violations should be documented. Worth adding: what was the violation? What was the response? This creates a paper trail that protects the organization if things escalate and demonstrates that the employee was given every opportunity to comply That alone is useful..

Step 3: Tailor the Response

Here's what most organizations get wrong: they use the same escalation path for every violation. Think about it: first warning, second warning, termination. That doesn't account for the severity of different violations or the individual circumstances Not complicated — just consistent..

A more effective approach considers:

  • Severity of the violation. Sharing a password is different from installing malware.
  • Sensitivity of the data the employee accesses. Susan in accounting might handle financial data that puts her violations in a higher-risk category.
  • Pattern over time. Is this a one-time slip or a repeated behavior?
  • Mitigating factors. Is there a language barrier? Did she receive adequate training?

Step 4: Make Compliance Easier

Sometimes the problem isn't the employee — it's the policy. If your security requirements are so cumbersome that they actively prevent people from doing their jobs, violations are inevitable Simple, but easy to overlook..

Ask yourself: Is there a reason Susan can't use a company-provided laptop? Are the password requirements so complex that people have to write them down? Does the VPN constantly drop connections, leading people to work around it?

If your security policies create more friction than people can handle, you'll lose. Fix the policy, not just the employee.

Common Mistakes That Make Things Worse

Let me be honest — most organizations handle situations like Susan's poorly. Here's what to avoid The details matter here..

The "One More Chance" Loop

Issuing endless warnings without consequences teaches employees that the rules don't really matter. Still, if you've given Susan three chances already, the fourth warning carries no weight. At some point, you need to follow through.

Blame-Only Approaches

Focusing solely on punishing violations without addressing why they happen creates resentment and doesn't fix the underlying problem. Susan might comply out of fear, but she won't become an advocate for security.

Treating All Employees the Same

Some people need more training. Some need clearer consequences. Some need better tools. A one-size-fits-all approach fails because it ignores the reasons behind the behavior.

Ignoring the System

If your organization's security culture is weak, individual enforcement won't solve the problem. You can fire Susan and hire someone new — and they'll likely develop the same habits in the same environment No workaround needed..

Practical Strategies That Actually Work

Here's what I'd recommend if you're dealing with a situation like Susan's That's the part that actually makes a difference..

Have a real conversation. Before escalating, sit down with Susan and ask open-ended questions. "Help me understand what's happening with the security requirements." You might learn something surprising — maybe she never received the training, maybe she has a disability that makes the login process difficult, maybe she genuinely doesn't understand the risk.

Connect security to her work. Abstract threats don't motivate most people. Instead, explain what a breach would mean for her job, her customers, her projects. "If someone accesses our financial systems through your account, we could lose contracts. Your projects could be affected."

Implement technical controls. Sometimes the best solution isn't better training — it's making it harder to violate the policy. If employees shouldn't use personal devices, block those devices at the network level. If they shouldn't click phishing links, improve email filtering. Reduce the opportunity for human error And that's really what it comes down to. Less friction, more output..

Create positive incentives. Recognition works better than punishment for building long-term culture. Recognize employees who report suspicious emails, complete their security training on time, or suggest security improvements. Make security something people want to be part of, not just rules to avoid breaking.

Know when to escalate. If Susan continues violating policies after clear communication, training, and support, there comes a point where continued employment is a risk the organization shouldn't accept. This isn't about being harsh — it's about protecting the organization and, honestly, being fair to other employees who do comply.

FAQ

What's the difference between an accidental and intentional security violation? An accidental violation happens when an employee makes a mistake without realizing it — clicking a phishing link, using a weak password, or inadvertently sharing data. An intentional violation occurs when someone knows the rule and chooses to break it. The response should be different: accidental violations typically warrant more training, while intentional violations may require disciplinary action.

Can we terminate an employee for repeated security policy violations? Yes, but it depends on your policies, employment laws, and the severity of the violations. Most employment is at-will, meaning you can terminate for any legal reason or no reason. On the flip side, you should document the violations and give the employee opportunities to correct behavior before termination to avoid claims of unfair treatment.

How can we prevent security violations without creating a culture of fear? Focus on education, enablement, and positive reinforcement. Make sure employees understand why policies exist. Provide tools that make compliance easy. Recognize and reward good security behavior. Fear-based approaches lead to hiding mistakes rather than reporting them And it works..

Should we monitor employees for security violations? Monitoring can be appropriate for certain roles or situations, but it needs to be balanced with privacy considerations and employee trust. Technical monitoring of systems (like logging access to sensitive data) is standard. Personal monitoring (keystrokes, screen recording) is more invasive and should be used sparingly with clear disclosure Took long enough..

How do we build a security-conscious culture? It starts at the top. Leadership needs to model good security behavior and visibly prioritize it. Integrate security into onboarding, regular training, and team discussions. Make it part of performance expectations. When security is treated as everyone's responsibility rather than just IT's problem, culture shifts.

The Bottom Line

Susan isn't unique. Think about it: every organization has employees who view security policies as suggestions rather than requirements. The difference between organizations that stay secure and those that don't isn't having perfect employees — it's having systems, culture, and responses that minimize violations and address them effectively when they occur.

That means understanding why violations happen, making compliance achievable, documenting appropriately, and being willing to escalate when necessary. It also means recognizing that sometimes the problem isn't the employee — it's a policy or culture that sets people up to fail.

Not the most exciting part, but easily the most useful.

Get those pieces right, and you'll have fewer Susans — not because you've found the perfect employee, but because you've built an environment where doing the secure thing is easier than doing the risky thing Most people skip this — try not to..

New on the Blog

Recently Added

Keep the Thread Going

From the Same World

Thank you for reading about Susan Regularly Violates Her Organization'S Security Policies: Complete Guide. We hope the information has been useful. Feel free to contact us if you have any questions. See you next time — don't forget to bookmark!
⌂ Back to Home