10.10.2025
"We know security is important, but we're just too small for a dedicated security person."
I hear this constantly from civil society organizations across East Africa. And they're not wrong. Most nonprofits, advocacy groups, and independent media organizations can't justify a full-time security role when they're already stretched thin.
But here's what I've learned from working with dozens of organizations: you don't build security by hiring a security person. You build it by creating a culture where security is everyone's responsibility and actually integrated into how work gets done.
The organizations with the strongest security posture aren't the ones with the biggest budgets or dedicated security teams. They're the ones where security became part of their organizational DNA.
Here's how they did it.
Most security training starts with tools: "Use Signal. Enable 2FA. Use a VPN."
This approach fails because people don't understand why they're being asked to change their behavior. When security feels like arbitrary rules that make work harder, people find workarounds.
Effective security culture starts with shared understanding of the threats your organization actually faces.
Make threat discussions regular and specific. Don't talk about "cyber threats" in abstract terms. Talk about what happened to organizations doing similar work. Discuss actual incidents: "Last month, an advocacy organization had their beneficiary list exposed because of cloud storage misconfiguration. Here's how it happened. Here's how we're different. Here's where we're similar."
Connect security to mission. Your team cares deeply about the work. Help them understand how security protects that work. For journalists, it's protecting sources. For human rights organizations, it's protecting beneficiaries. For advocacy groups, it's protecting the ability to continue operating. When people see security as mission-critical rather than IT requirements, behavior changes.
Be honest about trade-offs. Security often makes work less convenient. Acknowledge this. Explain why the inconvenience is worth it for specific situations. And be open about where convenience can reasonably take priority. Not everything needs maximum security - help people understand what actually matters.
The fastest way to ensure security measures get ignored is to impose them without input from the people who'll use them daily.
Involve team members in security planning. When evaluating new tools or procedures, include the people who'll actually use them. They'll identify practical obstacles you might miss and are more likely to follow procedures they helped design.
Create space for honest feedback. If a security measure isn't working in practice, you need to know. Build regular opportunities for team members to report what's actually difficult or not working. "This password policy is too strict" might seem like resistance, but it might also be legitimate feedback about procedures that encourage workarounds.
Respect operational expertise. The person managing your social media knows how social media harassment campaigns work better than any security framework does. The journalist knows source protection needs better than any generic guide. Security decisions should incorporate this expertise, not override it.
Security that exists as separate processes gets skipped when people are busy. Security that's embedded in how work gets done becomes automatic.
Integrate security into onboarding. New staff should learn security procedures as part of learning their role, not as a separate training. When setting up accounts becomes part of "here's how we communicate," it happens. When it's a separate security checklist, it gets delayed.
Attach security checks to existing milestones. Instead of "conduct quarterly access audits," attach it to something that already happens: "When we do quarterly financial reviews, we also review system access." Linking security tasks to established routines makes them more likely to happen.
Design tools around secure practices. If you want people to use encrypted storage, make it the default place to save documents. If you want separate work-personal contexts on devices, set up work profiles during device setup. Make security the path of least resistance, not additional effort.
One-time security workshops don't create security culture. Regular, practical engagement does.
Keep it relevant and current. Don't teach generic cyber hygiene. Address threats your team actually faces and tools they actually use. When new threats emerge in your sector, discuss them immediately while they're relevant.
Practice, don't just present. Don't just explain how to secure devices; practice doing it together. Don't just describe incident response; role-play scenarios. Muscle memory matters when security needs to happen under pressure.
Create peer learning opportunities. When someone on your team handles a security situation well, have them share what they did. When someone makes a mistake, create space to discuss it without blame. The goal is organizational learning, not individual fault.
Keep it conversational, not lecture-style. Formal training sessions have their place, but security culture develops through regular informal conversations. Five-minute security check-ins at team meetings often accomplish more than quarterly workshops.
You might not be able to hire a dedicated security person, but you can identify team members who take point on security for their area.
Distribute security responsibility. Instead of one person responsible for all security, assign specific areas: someone tracks access permissions, someone monitors for harassment campaigns, someone stays current on relevant threats in your sector. This distributes the cognitive load and builds broader expertise.
Support their learning. Make it part of their role to stay informed about security developments relevant to your work. This might mean following certain researchers, attending webinars, or connecting with security champions at similar organizations.
But avoid creating security gatekeepers. Security champions should be resources and facilitators, not approval bottlenecks. The goal is raising everyone's security awareness, not centralizing all security decisions.
Security culture exists when security is something everyone feels comfortable discussing, not something that only gets raised during incidents or trainings.
Make it okay to ask "stupid" questions. Create explicit norms that there are no stupid security questions. Confusion about security is a security issue – better to ask and understand than stay confused and make mistakes.
Celebrate good security practices. When someone catches a phishing attempt, when someone properly reports a potential compromise, when someone suggests a security improvement – acknowledge it. What gets recognized gets repeated.
Discuss security failures honestly. When things go wrong, focus on what the organization learned, not who made the mistake. Blame-based security culture means people hide problems until they become crises.
Include security in regular discussions. Don't reserve security conversations for dedicated meetings. When planning campaigns, launching projects, or adding new tools, security should be part of the conversation naturally.
You can't transform organizational culture overnight. Start with high-impact changes that are achievable with current capacity.
Identify your biggest current vulnerability. Don't try to fix everything at once. What's your most likely or most consequential threat? Start there.
Pick one practice to establish first. Maybe it's password manager adoption. Maybe it's device lockdown procedures. Maybe it's incident reporting processes. Master one thing before adding the next.
Build on successes. When one security practice becomes normal, use that momentum to introduce the next. "Remember how awkward 2FA felt at first? Now it's automatic. This new practice will feel the same."
Measure what matters. Don't measure compliance ("what percentage enabled 2FA?"). Measure understanding ("can team members explain why we use 2FA?") and capability ("can everyone actually use the security measures we've implemented?").
Building security culture is hard, ongoing work. It requires consistent attention, regular reinforcement, and genuine organizational commitment. Some days it will feel like you're making progress. Other days it will feel like you're pushing water uphill.
But here's what I've observed: organizations that invested in security culture, even without dedicated security staff or massive budgets, maintained stronger security posture than organizations with better tools but no cultural foundation. Because security ultimately isn't about technology. It's about people making good decisions consistently. And that requires culture, not just tools.
Take your Digital Security to the next level and stay ahead of evolving threats with our customized services.
Get started