The Click That Cost MGM Resorts $100 Million

In September 2023, a threat actor called Scattered Spider social-engineered an MGM Resorts help desk employee with a simple phone call. That one interaction led to a ransomware attack that shut down slot machines, hotel check-ins, and digital room keys across Las Vegas. MGM disclosed over $100 million in losses. The attacker didn't exploit a zero-day vulnerability. They exploited a human.

If you're searching for how to train employees on cybersecurity, you already suspect what I've confirmed across two decades in this field: technology alone doesn't stop breaches. People do — but only if you train them the right way.

This post breaks down exactly what works, what doesn't, and how to build a security awareness program that actually changes employee behavior. Not a checkbox exercise. Not a once-a-year slideshow. A system that measurably reduces your risk.

Why Most Cybersecurity Training Programs Fail

I've audited training programs at organizations of every size. The pattern is depressingly consistent. A company buys an annual compliance module, forces every employee through 45 minutes of slides in December, collects a signature, and calls it done. Then in March, someone clicks a credential theft phishing link and the whole thing unravels.

The 2023 Verizon Data Breach Investigations Report found that 74% of all breaches involved the human element — including social engineering, errors, and misuse. That number hasn't meaningfully dropped in years, despite billions spent on training. The problem isn't that organizations train. It's how they train.

Here's what I see going wrong repeatedly:

  • One-and-done delivery. Annual training creates a spike of awareness that fades within weeks. Memory doesn't work that way.
  • Generic content. A finance team and a warehouse crew face completely different threats. Cookie-cutter modules miss this entirely.
  • No reinforcement. Without phishing simulations, micro-lessons, and ongoing nudges, knowledge never converts to habit.
  • Punishment culture. When employees get shamed for failing a phishing test, they stop reporting real incidents. That's the opposite of what you want.

How to Train Employees on Cybersecurity: A Framework That Works

Let me walk through the approach I recommend to every organization I advise. It's built on behavioral science, not compliance theater.

Step 1: Establish Your Baseline

Before you teach anything, measure where you stand. Send a controlled phishing simulation to your entire workforce. Track who clicks, who reports, and who ignores. This gives you a click rate baseline — typically 25-35% for organizations with no prior training, based on industry benchmarks.

You can launch realistic phishing awareness training for your organization that establishes this baseline while simultaneously educating employees on what they missed. That first simulation is both a diagnostic and a teaching moment.

Step 2: Deliver Role-Based Training

Your CFO faces Business Email Compromise. Your receptionist faces pretexting phone calls. Your developers face supply chain attacks. Training must reflect these realities.

Segment your workforce into risk groups and deliver targeted content. At minimum, I recommend these tracks:

  • General workforce: Phishing identification, password hygiene, multi-factor authentication usage, physical security basics, safe browsing.
  • Finance and HR: BEC/wire fraud tactics, W-2 scams, invoice manipulation, verification procedures for payment changes.
  • IT and developers: Credential theft techniques, privilege escalation awareness, secure coding basics, zero trust principles.
  • Executives: Whaling attacks, social media reconnaissance, travel security, board-level reporting responsibilities.

A comprehensive cybersecurity awareness training program should cover these role-specific scenarios without requiring you to build everything from scratch.

Step 3: Make It Short, Frequent, and Specific

The research is clear. Spaced repetition beats marathon sessions. A 2020 USENIX study found that security awareness training effectiveness dropped significantly after about four months without reinforcement. By six months, employees performed nearly as poorly as untrained ones.

Here's the cadence I recommend:

  • Monthly: 5-10 minute micro-lessons on a single topic (e.g., spotting lookalike domains, or why SMS-based MFA is weaker than app-based).
  • Quarterly: Phishing simulation campaigns with varied difficulty and attack vectors — credential harvesting, malicious attachments, QR code phishing.
  • Annually: A more comprehensive refresher tied to policy acknowledgment and updated threat intelligence.

Step 4: Simulate Real-World Social Engineering

Phishing simulations are the closest thing to a fire drill that cybersecurity has. But most organizations run them poorly. They send obviously fake emails, use the same template repeatedly, and reduce the whole exercise to a gotcha game.

Effective phishing simulation programs escalate in sophistication over time. Start with obvious red flags — misspellings, suspicious sender addresses, generic greetings. Gradually introduce more realistic lures: fake password reset requests from your actual email provider's domain format, spoofed internal communications, LinkedIn connection notifications.

Track these metrics over time:

  • Click rate: Should decrease quarter over quarter.
  • Report rate: Should increase. This is actually more important than click rate — you want a workforce that reports suspicious messages fast.
  • Time to report: How quickly does someone flag something? Speed matters for incident response.

Step 5: Build a Reporting Culture, Not a Blame Culture

This is where most programs go off the rails. I've seen organizations publicly shame employees who fail phishing tests, dock performance reviews, even threaten termination. The result? People stop reporting anything suspicious because they're afraid of being wrong.

CISA emphasizes building a positive security culture in its cybersecurity best practices guidance. When an employee reports a real phishing email, celebrate it. When someone falls for a simulation, use it as a private coaching opportunity, not a public spectacle.

The goal is a workforce where clicking the "Report Phishing" button is as automatic as locking the front door.

What Does Effective Cybersecurity Employee Training Actually Look Like?

If you're trying to answer the question — how to train employees on cybersecurity — here's the short version that captures the essentials:

Effective cybersecurity training is role-specific, delivered in short frequent intervals, reinforced with phishing simulations, measured by report rates (not just click rates), and embedded in a culture where reporting is rewarded rather than punished. It is never a once-a-year event.

The $4.88 Million Lesson in the IBM Report

IBM's 2023 Cost of a Data Breach Report put the global average cost of a data breach at $4.45 million. In the United States, that figure was $9.48 million. But here's the number that should concern every training manager: organizations with high levels of security skills shortage faced breach costs $1.6 million higher than those with adequate staffing and training.

Training isn't overhead. It's a direct cost offset. Every employee who correctly identifies a phishing email is an incident that never reaches your SOC. Every credential theft attempt that gets reported instead of clicked is a ransomware deployment that never happens.

Real Incidents That Better Training Could Have Prevented

Twilio (August 2022)

Attackers sent SMS phishing messages to Twilio employees pretending to be the IT department. Employees clicked the links and entered their credentials on a fake Okta login page. The breach exposed data from over 100 Twilio customers. This was a textbook credential theft scenario that phishing simulation training directly addresses.

Uber (September 2022)

A teenager repeatedly sent multi-factor authentication push requests to an Uber contractor until the contractor approved one out of fatigue — a technique called MFA bombing. The attacker then accessed internal systems. Training employees to recognize and resist MFA fatigue attacks is a specific, teachable skill.

The FTC and Drizly (January 2023)

The FTC took action against alcohol delivery platform Drizly and its CEO after a 2020 breach exposed data on 2.5 million consumers. The FTC's complaint cited a failure to implement basic security training among other deficiencies. The order required the company to implement a comprehensive security program. Regulators are now holding leadership personally accountable for training failures.

Building Multi-Factor Authentication Into Your Training Program

I can't overstate this: multi-factor authentication is both a technical control and a training topic. Your employees need to understand not just how to use MFA, but why it matters and how attackers try to defeat it.

Cover these scenarios in your training:

  • MFA fatigue attacks: Teach employees to never approve an MFA request they didn't initiate, and to immediately report unexpected prompts.
  • SIM swapping: Explain why SMS-based MFA is the weakest option and encourage authenticator apps or hardware keys.
  • Adversary-in-the-middle attacks: Show how phishing kits can capture session tokens even with MFA enabled. This reinforces why clicking links is dangerous even when you have MFA turned on.

Zero Trust Starts With Trained Humans

Every zero trust architecture document focuses on network segmentation, identity verification, and least privilege access. Those are essential. But zero trust as a philosophy only works when employees understand and practice it.

That means training people to:

  • Verify requests through a second channel before transferring funds or sharing sensitive data.
  • Question unusual requests, even from executives. Especially from executives — that's exactly what BEC attackers impersonate.
  • Accept that security friction (extra authentication steps, access restrictions) exists to protect them, not slow them down.

NIST's zero trust architecture publication (SP 800-207) defines the technical framework, but the human layer is what makes or breaks implementation.

Measuring What Matters: Metrics That Prove Training Works

If you can't measure it, you can't improve it. Here are the metrics I track with every client:

  • Phishing simulation click rate: Benchmark quarterly. Aim for under 5% within 12 months of consistent training.
  • Phishing report rate: This should climb above 70%. A high report rate means your security culture is working.
  • Mean time to report: How fast do employees flag suspicious emails after receiving them? Faster reporting means faster incident response.
  • Training completion rate: Track by department. Low completion in a specific team signals a management problem, not just an employee problem.
  • Actual incident reduction: Correlate training milestones with help desk tickets, compromised accounts, and malware infections. This is your ROI story for leadership.

Your 90-Day Quick-Start Plan

If you're starting from zero — or effectively zero — here's exactly what I'd do in the first 90 days:

Days 1-14: Send a baseline phishing simulation. Don't announce it. Measure click rates and report rates across all departments.

Days 15-30: Roll out foundational training. Cover phishing identification, password management, MFA usage, and social engineering awareness. Enroll your entire organization in cybersecurity awareness training to cover these fundamentals efficiently.

Days 31-60: Deliver role-specific modules to high-risk groups (finance, HR, IT, executives). Launch your first post-training phishing simulation using different templates than the baseline.

Days 61-90: Review metrics. Compare baseline click rates to post-training rates. Identify departments or individuals who need additional coaching. Set up your ongoing phishing simulation program on a quarterly cadence. Present results to leadership with specific numbers.

Training Is Not a Project — It's a System

The organizations that figure out how to train employees on cybersecurity effectively treat it as infrastructure, not an event. They invest in ongoing simulation, frequent micro-training, real-time threat briefings, and a culture where every employee considers security part of their job description.

The threat actors targeting your organization right now aren't waiting for your annual training cycle. Scattered Spider didn't wait. The attackers behind the Twilio and Uber breaches didn't wait. They adapt constantly, and your training program has to do the same.

Start measuring. Start simulating. Start building the habits that turn your employees from your biggest vulnerability into your most effective detection layer. That's how you actually reduce risk — one trained human at a time.