Our methodology

Transforming human security behaviours for over 20 years

We use cyber awareness campaigns, engaging online training, employee development programs and behaviour change strategies to build a strong security culture.

Method gallery

95% of security breaches are caused by human error

Every organisation, regardless of size, needs information and cyber security training. 

Creating a culture where employees are alert to security threats and empowered to act securely against them, does not happen overnight. At TSC, we believe a consistent, integrated and sustained training and development programme is the best way to achieve a mature and resilient security culture.

Knowledge skills development nav

Our methodology

All our work is based on the establishment of long-term awareness and genuine, measurable behaviour change across the workforce. To achieve a balanced and manageable programme we adopt a phased approach to the delivery of our solutions.

Our underlying methodological approach is based on the COM-B model for behaviour change.

The model recognises that behaviour is influenced by many factors. It proposes that for people to engage in a behaviour (B), a person must be physically and psychologically able (C) and have the opportunity (O) to exhibit the behaviour, as well as the want or need to demonstrate the behaviour (M).

This is our preferred methodological approach because it identifies which components of behaviour need to be changed in order for an intervention to be successful and sustained over time.

Scroll 01
1 6

Discovery and analysis of current attitudes and behaviours

  • Security Awareness and Behaviour Research
  • Focus groups
  • 121 interviews
Scroll 02
2 6

Defining the behaviours required across the whole workforce

  • Scoping workshops
  • Strategy creation
  • Communications planning
Scroll 03
3 6

Embedding the behaviours into existing systems and processes

  • Competency frameworks
  • Key performance indicator’s
  • Scenarios based team activities
Scroll 3 new
4 6

Establishing networks of support

  • Champions programmes
  • Manager’s masterclasses and workshops 
  • Toolkits
Scroll 01
5 6

Providing training, communications and micro-learning

  • eLearning
  • Webinars
  • Digital games
  • Animated infographics
  • Social media
Scroll 04
6 6

Monitoring, measuring and evaluating the impact

  • SABR
  • Pre and post campaign assessments
  • Ethical phishing
  • Quizzes

See how we can help you protect your organisation today?