LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.

Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.

Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Top Content
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Apr 4, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Your employees think cybersecurity policies are too restrictive. How do you address their concerns?

How do you balance effective security with employee satisfaction? Share your solutions and experiences.

Cybersecurity Cybersecurity

Cybersecurity

+ Follow
Last updated on Apr 4, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Your employees think cybersecurity policies are too restrictive. How do you address their concerns?

How do you balance effective security with employee satisfaction? Share your solutions and experiences.

Add your perspective
Help others by sharing more (125 characters min.)
96 answers
  • Contributor profile photo
    Contributor profile photo
    Abdoulaye DIAKO

    IT Security Consultant | Protect organisations | Bring them up to/maintain them at an acceptable level of security, then aim for excellence.

    • Report contribution

    Implement relevant security solutions that are less invasive on the user side and depending on the context, implement user-friendly solutions. To avoid this frustration leading to shadow it or the desire to circumvent the company's security policy.

    Like
    15
  • Contributor profile photo
    Contributor profile photo
    Vimal Bhat

    Vice President & Branch Head

    • Report contribution

    I understand their concerns, no one likes feeling restricted. But our goal isn’t to make things harder; it’s to keep everyone and everything safe. I’d listen to their feedback, explain why these steps matter, and see if we can find a balance that protects the company while making their work smoother. It’s about working together, not creating roadblocks.

    Like
    12
  • Contributor profile photo
    Contributor profile photo
    Tinashe Lewis Karumazondo

    IT & Cybersecurity Specialist | Technology Enthusiast | Network Expert | IT & Digital Solutions | Driving Digital Transformation | Web & Mobile Developer |

    • Report contribution

    In the pharmaceutical industry, I understand that strict cybersecurity policies can feel restrictive, especially with sensitive data and regulatory compliance at stake. When employees raise concerns, I start by listening—hosting short sessions to explain the “why” behind policies and gathering feedback on real-world impact. If restrictions hinder productivity, we explore secure, compliant alternatives that support both efficiency and protection. Cybersecurity should be a shared responsibility, not a barrier. Involving staff in the conversation helps turn resistance into collaboration and builds a stronger, more security-conscious culture.

    Like
    10
  • Contributor profile photo
    Contributor profile photo
    Swastik A.

    Protecting AI & Applications | Threat Modeling, ML Security, and Product Security Expertise | Enabling Trustworthy Innovation

    • Report contribution

    🗣️ Listen to employees’ concerns through surveys or open chats to understand what feels too restrictive. 🤝 Work with experts to review rules and see if they can be made more flexible without risking security. 💡 Clearly explain the reasons behind each policy in simple, relatable ways, showing how they protect everyone. ⚖️ Find solutions that balance strong security with employees’ daily needs. 🔄 Keep communication open so employees can always share their thoughts. 📝 Regularly update policies to make sure they stay fair and effective for all.

    Like
    9
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To adress their concerns, you need to first evaluate how restrictive the cybersecurity policies are. This is so that you would know if it is too restrictive or not. You need to then explain to them why these policies are necessary. This is so that they would be willing to accept it and adhere to it instead if treating it as a hastle. You must also give them training especially on how to familiarize themselves with the policies. This is so that they wouldn't have problems while adhering to it when doing their work.

    Like
    8
  • Contributor profile photo
    Contributor profile photo
    Rebeca Burgos Castellanos

    IT Specialist | Google Cloud Cybersecurity Certified | Windows & Cloud Administration | Office 365 | Azure | VMware | Intune

    • Report contribution

    When employees see cybersecurity policies as too restrictive, it’s time to listen and adapt. I start by understanding their concerns, then explain the why behind the rules to build awareness and trust. Involving users in shaping solutions helps balance security with usability. I also ensure secure, user-friendly alternatives are available, so protection doesn’t feel like punishment. Cybersecurity works best when it’s a shared goal, not just an IT mandate. #Cybersecurity #Leadership #SecurityCulture #Infosec #DigitalTrust

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    Sonam Gupta

    Software Developer | Frontend Expert | React , Redux , Nextjs , Typescript , Sass , MicroFrontend

    • Report contribution

    If employees are feeling restrictive by cybersecurity policies , I can suggest following points to address their concerns :- 1. Frame policies like not just a set of another set of overwhelming rules but as a collection of phrases like Better safe than sorry etc. 2. Train employees in an intuitive manner to make them aware of Cybersecurity. 3. Provide engaging sessions , not just another training session imposed on employees but that can welcome them to be a part of it willingly to get some break from their work. 4. By launching random drills of cyber security threat often for continuous awareness. 5. Putting rewards on desk for the vigilant ones although in a way to motivate can do better people not to make them feel out or inferior.

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    Dr. Mohammad Reza Beheshti
    • Report contribution

    Restrictive security backfires—it frustrates users and drives risky behavior. The smarter path? Invisible security that works with humans, not against them. That’s why I built CyberSiARA—we replaced outdated CAPTCHAs and rigid rules with AI that understands human behavior and leverages a visual process only real people can pass. Frictionless for users, impossible for bots.

    Like
    6
  • Contributor profile photo
    Contributor profile photo
    Hernan Silva

    Partner - Chief Operating Officer @ CIO Landing | Business-IT Professionals

    • Report contribution

    Many time when you explain the risk they understand it. I more about communication of the reason for the restriction more than anything else. People believe that restriction are just red tape without a reason.

    Like
    5
  • Contributor profile photo
    Contributor profile photo
    Sanjay Katkar

    Co-Founder & Jt. MD Quick Heal Technologies | Ex CTO | Cybersecurity Expert | Entrepreneur | Technology speaker | Investor | Startup Mentor

    • Report contribution

    When we rolled out MFA (multi-factor auth), many found it annoying. After feedback, we: 1 Switched to app-based MFA (faster than SMS), 2 Showed a quick demo on how it prevents real attacks, 3 Made it a team challenge—“Phish Me If You Can!” Result? Adoption went up, and resistance dropped. Use short, relatable examples to explain threats, try to build awareness not just campaigns.

    Like
    5
View more answers
Cybersecurity Cybersecurity

Cybersecurity

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Cybersecurity

No more previous content
  • Your client doubts your incident response plan's effectiveness. How will you address their concerns?

    66 contributions

  • Facing a data breach with non-technical executives, how do you build trust through communication?

    67 contributions

  • How would you balance client confidentiality with disclosing cybersecurity breaches?

    33 contributions

  • You've experienced a data breach. How can you inform your clients without losing their trust?

    78 contributions

  • Your client wants lax security for easier access. How do you protect against potential cyber threats?

    44 contributions

  • You're upgrading your business's technology. How can you safeguard against cyber threats?

    69 contributions

  • Balancing user experience and cybersecurity in your organization: Are you willing to take the risk?

    75 contributions

  • Balancing user productivity and cybersecurity integrity is crucial. How can you achieve both effectively?

    44 contributions

  • You're facing a cybersecurity incident. How should you manage media inquiries effectively?

    44 contributions

  • A team member falls for a phishing email. How can you prevent a cybersecurity breach?

    122 contributions

  • You need to simplify user authentication for your platform. How can you do it without sacrificing security?

    38 contributions

  • You’re considering a new third-party vendor. How do you assess their cybersecurity risks?

    28 contributions

  • Your team member is ignoring remote cybersecurity duties. How will you address this critical breach?

    52 contributions

  • An executive requests unauthorized access for convenience. Do you compromise cybersecurity for convenience?

    28 contributions

  • Struggling with team resistance to secure remote access solutions?

    16 contributions

No more next content
See all

More relevant reading

  • Information Security
    You're building a team in information security. How do you find the right people for the job?
  • Information Security
    How do you create a SOC that meets your goals?
  • Cybersecurity
    Here's how you can handle power dynamics with your boss in the cybersecurity field.
  • Computer Science
    How can you resolve conflicts with team members who violate security policies?

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Security
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
16
96 Contributions