{"id":22698,"date":"2020-02-11T09:00:52","date_gmt":"2020-02-11T08:00:52","guid":{"rendered":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?p=22698"},"modified":"2020-02-24T16:00:10","modified_gmt":"2020-02-24T15:00:10","slug":"thirdspace-how-to-create-a-security-culture","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/","title":{"rendered":"How to create a security culture: 5 steps to success"},"content":{"rendered":"

Cyber security is as hot a topic as ever in business \u2013 the UK\u2019s cybersecurity agency found that 78% of businesses rate it as a top priority.<\/p>\n

At ThirdSpace, we recognise that evaluating the security posture of your organisation<\/a> can be complex and very time consuming. It can be even harder to communicate your position and investment requirements at board level.<\/p>\n

But by engaging the technical, operational, and cultural parts of the business, we help create a thorough understanding of any challenges, processes and behaviour. As John talks to IT to get a tech overview of the security posture, Harini, talks to the people to get both an operational and cultural overview.<\/p>\n

A typical starting point for us is to conduct a current state assessment<\/a>. This involves a team of experienced consultants and support analysts, using a variety of analytical tools to define an up-to-date security and compliance posture score for your business. At the end of this assessment, we provide an easy-to-use visual dashboard highlighting your security posture and a detailed remediation roadmap to address any concerns.<\/p>\n

\"AnBut sometimes the best force for change can come from within. Here\u2019s five steps you can use to create a successful security culture.<\/p>\n

1.\u00a0\u00a0\u00a0\u00a0\u00a0 User impact<\/h3>\n

The first step is understanding the impact these changes will have on your employees. Successful adoption doesn\u2019t focus on just tools and processes \u2013 it uses a people-centric approach.<\/p>\n

Keeping a people-centric approach, we recently helped a recruitment company<\/a> ensure they enabled their employees to be collaborative and productive while improving their security posture. After an initial security assessment, follow-on support and strategy workshops, the organisation successfully introduced tools and technology that made them more secure.<\/p>\n

What you can do as<\/strong>\u2026<\/strong><\/p>\n

CEO<\/strong>:<\/strong> Engage with your board on taking a people-centric mindset and understand how the changes can impact employees at the start of the project.
\nIT manager<\/strong>:<\/strong> Use a security dashboard to understand your immediate security gaps and think about how you can improve your user experience across the different personas within the organisation.
\nFirstline worker<\/strong>:<\/strong> Take a proactive approach to change and take part in workshops. Feedback to your manager\/teams while the project is ongoing.<\/p>\n

2.\u00a0\u00a0\u00a0\u00a0\u00a0 Address resistance<\/h3>\n

Let\u2019s face it, people have a natural resistance to change. Organisations need to plan for resistance. However, by showing employees the benefits of change and how it can enable them to work smarter, they will be more likely to accept change and get involved early on.<\/p>\n

Employees can often find multifactor authentication (MFA) annoying and are resistant to using it. However, according to Verizon\u2019s data breaches survey, <\/span>62% attacks were caused by compromised credentials<\/a>. An organisation needs to use MFA to prevent any credential attacks. Some people may need more support learning to get the best from the tool. Others may just need to be shown why it\u2019s so important to use.<\/span><\/p>\n

What you can do as<\/strong>\u2026<\/strong><\/p>\n

CEO<\/strong>:<\/strong> Create hypothetical personas of different types of resistance and plan how to overcome it as a business. Convert those most resistant into champions of change. Evangelise the importance of security with the personas who are most resistant and reward those with minimal resistance.
\nIT manager<\/strong>:<\/strong> Run workshops to help showcase the benefits of new tools or processes. Offer assistance for those who need extra help or seem resistant.
\nFirstline worker:<\/strong> Understand that change may seem difficult at first, but will in the long-run help you become more productive, collaborative, and secure. Discuss changes and security with colleagues and offer assistance to those who need more understanding.<\/p>\n

3.\u00a0\u00a0\u00a0\u00a0\u00a0 Raise awareness<\/h3>\n

Figure out your organisation\u2019s highest priority and what would have the biggest impact and then wrap it into a campaign. Ensure you get the message clear from the start.\u00a0Mention the current security posture of the organisation and how it can be improved. Be honest and transparent about any breaches or failings – this will cause employees to be more vigilant and aware that it happens to everyone \u2013not just something you read about in the news.<\/p>\n

What you can do as<\/strong>\u2026<\/strong><\/p>\n

CEO:<\/strong> Honest communication is key. Talk about any real or hypothetical failings from a lack of security culture and the changes both you and the business are making as a whole.
\nIT manager:<\/strong> Run campaigns with security-positive messaging. For example, phishing attacks are the most common attack vector. Have a campaign where you send a fake phishing link to employees – if they click the link it takes them straight into your training platform to develop their skills and understanding.
\nFirstline worker:<\/strong> Keep up to date with your organisation\u2019s security posture. Take an active part in training and encourage co-workers to do the same.<\/p>\n

4.\u00a0\u00a0\u00a0\u00a0\u00a0 Training<\/h3>\n

Perhaps the most important step \u2013 training should be available for all employees, cover a wide range of topics and address new security threats as they arise.<\/p>\n

Make training flexible and encourage employees to learn at their own pace. Ensure each course is relevant for the employee and their specific role and identify which courses are a high priority.<\/p>\n

\"A<\/p>\n

What you can do as<\/strong>\u2026<\/strong><\/p>\n

CEO<\/strong>:<\/strong> Don\u2019t just talk the talk. Ensure you and your C-level staff take an active and visible part in training to show the importance of a positive security culture.
\nIT manager:<\/strong> Change won\u2019t happen overnight. People need to hear things up to seven times for it to really stick. Have different training methods to support different ways of learning, whether that\u2019s on-demand or in-person, and ensure your training is updated as the threat landscape changes.
\nFirstline worker:<\/strong> Take time to do security training and ensure it stays up-to-date. Encourage others to do the training. Share your feedback if you think the training isn\u2019t relevant or needs updating.<\/p>\n

5.\u00a0\u00a0\u00a0\u00a0\u00a0 Rewards and recognition<\/h3>\n

The reinforcement of change is really important. Make sure both operational and adoption sides of the project are supported. Identify and keep champions of change involved in the process to ensure it stays topical in the business.<\/p>\n

Try and praise end users too. Recognise when they continually refresh their security knowledge. To have a successful security culture you have to ensure it doesn\u2019t stay stagnant.<\/p>\n

What you can do as<\/strong>\u2026<\/strong><\/p>\n

CEO<\/strong>:<\/strong> Communicate security wins and updates throughout the project. Reward success company-wide and for security champions to encourage everyone to take part.
\nIT manager<\/strong>: Continuously keep employees up to date with security news, new productivity tools and any training. Create a team of champions to keep cybersecurity topical.
\nFirstline worker:<\/strong>\u00a0 Take part in schemes that help you keep up to date with the latest security threats.<\/p>\n

More than tools<\/h2>\n

A mobile, productive workforce needs seamless access to documents and data irrespective of where an employee is and what device they have. What you have then is a complicated landscape where you need to balance the day-to-day running of the business with securing data and mitigating risk.<\/p>\n

Creating a successful security culture in an organisation is more than inputting a few new tools and processes \u2013 it\u2019s not a \u2018one and done\u2019 operation.\u00a0Organisations need to understand that security is an ongoing journey, and you need to engage all employees to ensure it stays successful.<\/p>\n

Find out more<\/h2>\n

A cybersecurity view from Microsoft<\/a><\/p>\n

About the authors<\/h2>\n

\"John<\/p>\n

John Hur is an experienced Microsoft architect, specialising in the designing, planning and deployment of large scale enterprise architecture, with a specific focus on modern productivity, security and management as part of the Microsoft cloud technology stack. His core skill set focuses on Microsoft 365 and Microsoft Azure.<\/p>\n

Working with ThirdSpace, John is an experienced Microsoft 365 and Azure architect. He offers consultancy, advisory services, business value workshops, proof of concepts, business transformation strategising, solution design, planning and delivery of hybrid infrastructure and services.<\/p>\n

John was also chosen by Microsoft to become a P-TSP (Partner Technical Solutions Professional) in both Microsoft Office 365 and Enterprise Mobility + Security.<\/p>\n

 <\/p>\n

\"Photo<\/p>\n

Harini is responsible for the Business Transformation Practice at ThirdSpace, making sure technology projects are delivered with the employee\u2019s needs in mind.<\/p>\n

Harini helps our customers to adopt the technology and transform their ways of working to stay secure and current in a world of fast-paced change.<\/p>\n

Before joining ThirdSpace, Harini has had many years\u2019 experience in delivering change programmes as a Business Change Consultant and Digital Transformation Architect working for another Microsoft Gold Partner.<\/p>\n","protected":false},"excerpt":{"rendered":"

Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.<\/p>\n","protected":false},"author":585,"featured_media":25104,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1],"post_tag":[256,804,134,199],"content-type":[],"coauthors":[1152,1155],"class_list":["post-22698","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cross-industry","tag-culture","tag-cyber-security","tag-digital-transformation","tag-security"],"yoast_head":"\nHow to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom<\/title>\n<meta name=\"description\" content=\"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"og:description\" content=\"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - United Kingdom\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-11T08:00:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-24T15:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Harini Bandara, John Hur\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Harini Bandara, John Hur\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/harini-bandara\/\",\"@type\":\"Person\",\"@name\":\"Harini Bandara\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/john-hur\/\",\"@type\":\"Person\",\"@name\":\"John Hur\"}],\"headline\":\"How to create a security culture: 5 steps to success\",\"datePublished\":\"2020-02-11T08:00:52+00:00\",\"dateModified\":\"2020-02-24T15:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\"},\"wordCount\":1392,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png\",\"keywords\":[\"Culture\",\"Cyber-security\",\"Digital Transformation\",\"Security\"],\"articleSection\":[\"Cross-industry\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\",\"name\":\"How to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png\",\"datePublished\":\"2020-02-11T08:00:52+00:00\",\"dateModified\":\"2020-02-24T15:00:10+00:00\",\"description\":\"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png\",\"width\":800,\"height\":450,\"caption\":\"How To Create A Security Culture - Featured Image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to create a security culture: 5 steps to success\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - United Kingdom\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - United Kingdom\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom","description":"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/","og_locale":"en_US","og_type":"article","og_title":"How to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom","og_description":"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.","og_url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/","og_site_name":"Microsoft Industry Blogs - United Kingdom","article_published_time":"2020-02-11T08:00:52+00:00","article_modified_time":"2020-02-24T15:00:10+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png","type":"image\/png"}],"author":"Harini Bandara, John Hur","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Harini Bandara, John Hur","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/harini-bandara\/","@type":"Person","@name":"Harini Bandara"},{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/author\/john-hur\/","@type":"Person","@name":"John Hur"}],"headline":"How to create a security culture: 5 steps to success","datePublished":"2020-02-11T08:00:52+00:00","dateModified":"2020-02-24T15:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/"},"wordCount":1392,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png","keywords":["Culture","Cyber-security","Digital Transformation","Security"],"articleSection":["Cross-industry"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/","name":"How to create a security culture: 5 steps to success - Microsoft Industry Blogs - United Kingdom","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png","datePublished":"2020-02-11T08:00:52+00:00","dateModified":"2020-02-24T15:00:10+00:00","description":"Security is an ongoing journey and you need to engage all employees to ensure it stays successful. Find out how to maintain a successful security culture.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2020\/02\/ID7101-HowToCreateASecurityCulture-FeaturedImage.png","width":800,"height":450,"caption":"How To Create A Security Culture - Featured Image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/cross-industry\/2020\/02\/11\/thirdspace-how-to-create-a-security-culture\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"How to create a security culture: 5 steps to success"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","name":"Microsoft Industry Blogs - United Kingdom","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - United Kingdom","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-content\/uploads\/sites\/22\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - United Kingdom"},"image":{"@id":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/22698"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/users\/585"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/comments?post=22698"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/posts\/22698\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media\/25104"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/media?parent=22698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/categories?post=22698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=22698"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=22698"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-gb\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=22698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}