Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Mar 30, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Your remote team resists new cybersecurity measures. How should you handle the pushback?

How would you approach pushback on new cybersecurity measures? Share your strategies.

Cybersecurity Cybersecurity

Cybersecurity

+ Follow
Last updated on Mar 30, 2025
  1. All
  2. IT Services
  3. Cybersecurity

Your remote team resists new cybersecurity measures. How should you handle the pushback?

How would you approach pushback on new cybersecurity measures? Share your strategies.

Add your perspective
Help others by sharing more (125 characters min.)
12 answers
  • Contributor profile photo
    Contributor profile photo
    Afonso Cruz

    Business Consultant at PRi

    • Report contribution

    When remote teams push back on cybersecurity, I start with trust, not rules. Resistance usually comes from overwhelm. It’s not always about the MFA token, but about context, pressure, and disruption. So I listen first. I ask, “What would make this easier for you?” I involve the team, not impose. One thing that worked: turning them into “security testers”, asking them to spot weak points. It shifted their mindset from frustration to ownership. Security should feel like support, not surveillance. That’s how you build real adoption.

    Like
    4
  • Contributor profile photo
    Contributor profile photo
    Mavuduru Gurucharan

    Cyber Security Team @ SYNTHOQUEST PRIVATE LIMITED | Cybersecurity, SOC, Threat Hunting | Aitam EEE 2021 - 25 | LEAD MANAGER AT BRANDING JESTER

    • Report contribution

    Educating users about cybersecurity is crucial—but complexity can overwhelm. 🔐 The solution? Simplify without compromising impact. ✔ Focus on real-world relevance—make threats relatable. ✔ Use clear, actionable insights instead of technical jargon. ✔ Leverage hands-on learning: phishing simulations, quick quizzes, and case studies. ✔ Keep it continuous—awareness isn’t a one-time event. Cybersecurity is everyone’s responsibility. Let’s make learning accessible, engaging, and effective. How do you simplify cybersecurity awareness in your organization? Drop your thoughts below! ⬇️ #CyberSecurity #SecurityAwareness #InfoSec #CyberResilience

    Like
    2
  • Contributor profile photo
    Contributor profile photo
    Shuvon Md Shariar Shanaz

    Ex World Top 1 TryHackMe • Hacker • Bug Bounty Hunter • Penetration Tester • NASA HOF

    • Report contribution

    When facing pushback on new cybersecurity measures, focus on education and alignment. Explain the risks in business terms, showing how these measures protect operations, customers, and revenue. Engage stakeholders early, addressing concerns and demonstrating usability improvements. Offer real-world examples of breaches prevented by similar policies. If resistance continues, implement changes incrementally, allowing teams to adapt without disrupting workflows. Making security a collaborative effort ensures smoother adoption and long-term compliance.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Chintan Mathukiya

    Fullstack Web Developer | Laravel & Vue.js Specialist | API & SaaS Expert

    • Report contribution

    When your remote team resists new cybersecurity measures, focus on clarity, convenience, and empathy. Instead of just enforcing rules, explain why they matter -how a data breach could impact both the company and them personally. -Listen to concerns and offer solutions like password managers or phased rollouts. -Keep it simple with short guides or Q&A sessions. Lead by example—if leadership follows the rules, the team is more likely to comply. -And most importantly, introduce changes gradually to reduce frustration. Security works best when everyone feels like a partner, not just a rule-follower. 🔒🚀

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Adnan Ahmed

    Senior Microsoft 365 Engineer | Microsoft 365 Migrations | Entra ID (Azure AD) | Exchange Server and Online | Teams & SharePoint | Intune | PowerShell | Security & Compliance | Open to Work

    • Report contribution

    When facing pushback on new cybersecurity measures, I take a structured approach that balances security with user adoption. I start by explaining why the changes are necessary, emphasizing compliance, data protection, and potential risks. I ensure policies are practical and align with business workflows to minimize disruption. Hands-on training and clear documentation help bridge knowledge gaps, while feedback sessions allow users to voice concerns and suggest improvements. I also implement phased rollouts and pilot groups to test new controls before full deployment. Finally, I work closely with leadership to enforce policies while maintaining a user-friendly experience, ensuring security without compromising productivity.

    Like
  • Contributor profile photo
    Contributor profile photo
    David Lim

    Founder & CEO at Lim Dynamics LLC | Business Leader | Trusted Advisor to Business + Agency Owners & Leaders | Former VP of Operations for full-service advertising/digital agencies

    • Report contribution

    Engage openly with the remote team to understand the concerns/issues that are driving the resistance to new cybersecurity measures. Educate the team on the new measures including (1) the reasoning behind the need for new measures, (2) how these measures work and help protect them, clients, and the business or organization, and (3) the potential impacts without these new measures in place. A lack of education and thorough understanding may be a significant driver of resistance. If practical, consider a phased approach to implementing the new cybersecurity measures to allow the team to become acclimated to the incremental changes while providing relevant feedback which can be used to help streamline or improve the process.

    Like
  • Contributor profile photo
    Contributor profile photo
    Brendan O.
    • Report contribution

    Everyone understands money. If the new measures are tied to Liability Insurance, explain that frankly. *However* that frankness should then lead toward educating and engaging your team: - Listen to the team’s concerns and gather feedback. - Explain how the measures are necessary. Share real examples of data breaches or phishing attacks that could negatively impact the company and the team. - Frame the new measures as an investment in their own protection and security, as well as the security of the company. - Offer comprehensive training to walk them through the new measures step-by-step. - As a leader, model the desired behaviors. - Allow your team to express concerns regularly and adapt.

    Like
  • Contributor profile photo
    Contributor profile photo
    Maria Kristine Villafuerte

    General Virtual Assistant| Data Entry | Digital Marketing | Social Media Marketing | Google Ads| Accounting Clerk | QuickBooks| Online Tutor| Research| UX Design Student

    • Report contribution

    Communicate the importance of the measures, address concerns through open dialogue, provide clear training, and highlight how the changes protect both the team and the organization.

    Like
  • Contributor profile photo
    Contributor profile photo
    Pinaki Ranjan Aich, CISA

    Best Selling Author || CISA| ISO 27001/27701/42001 LA | SOX | CPISI | PRINCE2 Agile Practitioner| ITGC | IFC | COBIT 5| Privacy and Data Protection| CyberArk Certified Trustee | ITIL | Security Intelligence Engineer

    • Report contribution

    1. Communicate the importance of cybersecurity measures clearly. 2. Address specific concerns raised by the team. 3. Involve team members in decision-making processes. 4. Provide training tailored to remote work scenarios. 5. Demonstrate how measures protect remote work efficiency. 6. Offer technical support to ease transitions. 7. Create open channels for feedback and improvement. 8. Phase implementation to reduce disruptions.

    Like
  • Contributor profile photo
    Contributor profile photo
    Roman Kaliakin

    QA Automation Engineer | Playwright | API & UI Testing | Web & Mobile | 8+ Years Experience

    • Report contribution

    As a QA engineer, I approach pushback on new cybersecurity measures the same way I approach any process change: with logic, clarity, and a focus on real impact. I don’t try to “sell” security. I explain how it ties directly into product quality, risk mitigation, and long-term stability. If something introduces friction, I call it out and look for a better solution that doesn't weaken protection. Remote teams often push back when things feel sudden or poorly integrated. So I push for realistic rollouts, proper documentation, and clear communication. Security isn’t just IT’s job - it’s part of delivering a reliable product. I treat it that way, and that mindset helps cut through most resistance.

    Like
View more answers
Cybersecurity Cybersecurity

Cybersecurity

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Cybersecurity

No more previous content
  • Your employees are ignoring cybersecurity policies. How can you get them engaged?

    16 contributions

  • You're facing limited resources for cybersecurity. How can you still maximize your efforts?

  • Your organization faces a breach due to a vendor's lax security. How can you prevent data privacy violations?

    12 contributions

  • Your business units are clashing over security protocols. How can you mediate effectively?

    10 contributions

  • Your employees are scattered across different locations. How can you ensure secure remote access?

    12 contributions

  • Budget cuts are threatening your cybersecurity measures. How do you ensure nothing critical is missed?

    18 contributions

  • How would you address employee concerns about the impact of cybersecurity measures on productivity?

    11 contributions

  • Your network demands strong authentication and seamless access. How do you achieve both?

    15 contributions

  • Your project has conflicting IT and cybersecurity priorities. How can you align their goals effectively?

  • Balancing IT security and user convenience: Are you willing to compromise security for ease of use?

  • Your company faced a major data breach. How can you regain customer trust and loyalty?

    13 contributions

  • You're juggling multiple project deadlines. How do you decide which security updates to prioritize?

    12 contributions

No more next content
See all

More relevant reading

  • Cybersecurity
    How can you balance cybersecurity research with operational security?
  • Cybersecurity
    What are the best ways to simulate an attack on an organization's network?
  • Computer Networking
    You're looking to protect your network from cyber threats. How can you become a security expert?
  • Cybersecurity
    Here's how you can stand out as a top Cybersecurity professional by adapting to new cyber attack techniques.

Explore Other Skills

  • IT Strategy
  • System Administration
  • Technical Support
  • IT Management
  • Software Project Management
  • IT Consulting
  • IT Operations
  • Data Management
  • Information Security
  • Information Technology

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
1
12 Contributions