Agree & Join LinkedIn

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Skip to main content
LinkedIn
  • Articles
  • People
  • Learning
  • Jobs
  • Games
Join now Sign in
Last updated on Feb 6, 2025
  1. All
  2. Engineering
  3. Network Security

Facing pushback from your team on network security upgrades. How can you win them over to stricter measures?

Getting buy-in for stricter network security measures can be tough, but it's essential for protecting sensitive data. To persuade your team:

- Emphasize the risks of inadequate security, using real-world examples to highlight potential threats.

- Involve the team in the decision-making process, fostering a sense of ownership and understanding.

- Offer training to ease the transition, ensuring everyone is confident in using the new systems.

How have you successfully navigated resistance to new security measures?

Network Security Network Security

Network Security

+ Follow
Last updated on Feb 6, 2025
  1. All
  2. Engineering
  3. Network Security

Facing pushback from your team on network security upgrades. How can you win them over to stricter measures?

Getting buy-in for stricter network security measures can be tough, but it's essential for protecting sensitive data. To persuade your team:

- Emphasize the risks of inadequate security, using real-world examples to highlight potential threats.

- Involve the team in the decision-making process, fostering a sense of ownership and understanding.

- Offer training to ease the transition, ensuring everyone is confident in using the new systems.

How have you successfully navigated resistance to new security measures?

Add your perspective
Help others by sharing more (125 characters min.)
5 answers
  • Contributor profile photo
    Contributor profile photo
    Bruno Figueiró

    Cyber Security | Cloud Security | Network Security | Security Architecture | CompTIA Security+ and Cisco CCNA Certified

    • Report contribution

    Implement stricter security measures and controls can be an unease task to accomplish, but some ground rules, when applied, might make this effort smooth: - Always emphasize security risks, using real examples and losses caused by breaches; - Offer security awareness training to the whole company, ensuring the understanding that all employees have a part on the security process.

    Like
    3
  • Contributor profile photo
    Contributor profile photo
    Alexia Wong

    Tuition teacher. Earned Community Top Voice Badge in Teaching in '23 and Community Top Voice Badge in Cybersecurity in '24.

    • Report contribution

    To win them over to stricter measures, you need to first convince them by telling them the consequences of not using these new network security upgrades. This is so that they would know why it's necessary. You need to then give them regular training. This is so that they wouldn't face any troubles caused by these new upgrades. You need to make sure that inform them of any new security measures. This is so that you would know if they are against it or not and if they are, why are they.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Mayank Bhardwaj

    An entrepreneur with a dream and purpose……

    (edited)
    • Report contribution

    You can always update your team with real-world examples of happenings/awareness going around the globe at other places/countries/regions/organisations. E.g.: A developing/smaller/non-productive nation/organisation may not face as many threats as a developed/profound nation/organisation, maybe because their data has much to offer. But if an organisation grows further, there is a sense of responsibility for not just the Team but also the automated system to be updated for future vulnerabilities/threats.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Vivek Sharma

    COO & Co-Founder at Sarv.com, Strategic Planner| Technical Advisor| Market Analyst

    • Report contribution

    Winning over your team on stricter network security measures requires clear communication, collaboration, and demonstrating value. Start by explaining the risks in relatable terms, using real-world breaches to highlight potential consequences. Show how security upgrades protect both the business and employees, rather than just adding restrictions. Involve the team early, gathering feedback and addressing concerns to ensure usability. Implement user-friendly security solutions like adaptive MFA and single sign-on (SSO) to minimize friction. Offer training and support to ease the transition. By framing security as an enabler rather than a barrier, you can foster buy-in and long-term compliance.

    Like
    1
  • Contributor profile photo
    Contributor profile photo
    Phillemon Neluvhalani

    Founder & CEO @WardenShield | Research Fellow & Industry Scientist @AIIA | Co-Founder of Global Transport News Network | Founder & CEO @Globe MegaMart | INVESTOR

    • Report contribution

    Convincing your team to embrace stricter network security can feel like an uphill battle, but a smart approach can turn resistance into support 🔐. Show them the risks—real-world breaches and their consequences can drive the point home 🚨. Make them part of the process by gathering input and addressing concerns, so they feel heard and involved 🤝. Provide hands-on training to ensure they’re comfortable with the changes, reducing frustration and boosting compliance 📚.

    Like
Network Security Network Security

Network Security

+ Follow

Rate this article

We created this article with the help of AI. What do you think of it?
It’s great It’s not so great

Thanks for your feedback

Your feedback is private. Like or react to bring the conversation to your network.

Tell us more

Report this article

More articles on Network Security

No more previous content
  • Your network security is at risk due to an insecure IoT device. How will you prevent a potential data breach?

    10 contributions

  • Your team is accused of a security breach they didn't cause. How do you prove their innocence?

    13 contributions

  • Struggling to explain network security protocols to non-technical colleagues in a remote work setup?

    14 contributions

  • Employees are bypassing VPN protocols in your company. Are your network security measures enough?

    7 contributions

  • Your remote team relies heavily on VPNs. How can you safeguard against potential vulnerabilities?

    11 contributions

  • You're integrating third-party software into your network. How do you mitigate the security risks?

    6 contributions

  • You need to address a diverse audience on network security. How do you make your presentation effective?

    9 contributions

  • Clients are worried about complex access control measures. How do you ease their concerns?

    7 contributions

  • Ensuring robust security is critical for your network. How do you maintain seamless access?

    2 contributions

No more next content
See all

More relevant reading

  • Information Security
    Your team is responsible for security protocols. How can you ensure everyone knows their role?
  • IT Operations
    What are the steps to designing an effective security operations center (SOC)?
  • Cybersecurity
    Here's how you can handle power dynamics with your boss in the cybersecurity field.
  • Information Security
    Here's how you can develop the essential skills to lead an information security team.

Explore Other Skills

  • Programming
  • Web Development
  • Agile Methodologies
  • Machine Learning
  • Software Development
  • Data Engineering
  • Data Analytics
  • Data Science
  • Artificial Intelligence (AI)
  • Cloud Computing

Are you sure you want to delete your contribution?

Are you sure you want to delete your reply?

  • LinkedIn © 2025
  • About
  • Accessibility
  • User Agreement
  • Privacy Policy
  • Cookie Policy
  • Copyright Policy
  • Brand Policy
  • Guest Controls
  • Community Guidelines
Like
5 Contributions