{"id":8529,"date":"2023-09-26T10:13:56","date_gmt":"2023-09-26T10:13:56","guid":{"rendered":"https:\/\/brooklynpartners.com\/blog\/overcoming-skepticism\/"},"modified":"2023-09-26T10:13:56","modified_gmt":"2023-09-26T10:13:56","slug":"overcoming-skepticism","status":"publish","type":"post","link":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/","title":{"rendered":"Overcoming Skepticism"},"content":{"rendered":"<div id=\"pl-5505\" class=\"panel-layout\">\n<div id=\"pg-5505-0\" class=\"panel-grid panel-has-style\" data-style=\"{\"class\":\"page-heading\",\"padding\":\"120px 0px 60px 0px\",\"background\":\"#f7f8f9\",\"background_image_attachment\":false,\"background_display\":\"tile\",\"full_height\":\"\",\"row_stretch\":\"full\",\"cell_alignment\":\"flex-start\",\"disable_row\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"page-heading siteorigin-panels-stretch panel-row-style panel-row-style-for-5505-0\" data-stretch-type=\"full\">\n<div id=\"pgc-5505-0-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-5505-0-0-0\" class=\"so-panel widget widget_siteorigin-panels-post-content panel-first-child panel-last-child\" data-index=\"0\" data-style=\"{\"class\":\"heading-h1\",\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"heading-h1 panel-widget-style panel-widget-style-for-5505-0-0-0\"><span style=\"font-size: revert; color: initial; font-family: -apple-system, BlinkMacSystemFont, 'Segoe UI', Roboto, Oxygen-Sans, Ubuntu, Cantarell, 'Helvetica Neue', sans-serif;\">Cyber security is critical in the modern world for organizations regardless of their size or industry. It protects sensitive information, ensures business continuity and prevents serious damage to reputation. However, despite growing awareness of the risks, many organizations still experience resistance in the form of skepticism to cyber security. Understanding and addressing this skepticism is vital to an effective security policy.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-5505-3\" class=\"panel-grid panel-has-style\" data-style=\"{\"class\":\"quote-wrap\",\"row_css\":\"margin-top:100px;\",\"background_image_attachment\":false,\"background_display\":\"tile\",\"full_height\":\"\",\"cell_alignment\":\"flex-start\",\"disable_row\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\" data-label=\"QUOTE\">\n<div class=\"quote-wrap panel-row-style panel-row-style-for-5505-3\">\n<div id=\"pgc-5505-3-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-5505-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child\" data-index=\"3\" data-style=\"{\"class\":\"quote-start\",\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"quote-start panel-widget-style panel-widget-style-for-5505-3-0-0\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p>&#8221;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"panel-5505-3-0-1\" class=\"so-panel widget widget_sow-editor\" data-index=\"4\" data-style=\"{\"class\":\"quote\",\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"quote panel-widget-style panel-widget-style-for-5505-3-0-1\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p class=\"font-size: 35px;line-height: 55px;\">Joost works at an organization where teams will be self-organizing in a year&#8217;s time. Teams become responsible for various tasks they did not have before.<br \/>\nJoost doesn&#8217;t understand why his team has to take on all these tasks.  <span style=\"color: #c028b9;\">He does have better uses for his time and wonders what the support departments are for then.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"panel-5505-3-0-2\" class=\"so-panel widget widget_sow-editor panel-last-child\" data-index=\"5\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><em>the name Joost was chosen at random and does not refer to a colleague named Joost.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-5505-4\" class=\"panel-grid panel-has-style\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"cover\",\"full_height\":\"\",\"row_stretch\":\"full\",\"cell_alignment\":\"flex-start\",\"disable_row\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\" data-label=\"tekst\">\n<div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-5505-4\" data-stretch-type=\"full\">\n<div id=\"pgc-5505-4-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-5505-4-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<h2 class=\"widget-title\">Why is skepticism a challenge?<\/h2>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><br \/>\n  <span style=\"font-weight: 400;\">Perception of low relevance<\/span><br \/>\n<\/i><span style=\"font-weight: 400;\">: Some employees may believe that they are not the target of cyberattacks and therefore view security measures as excessive.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><i><br \/>\n  <span style=\"font-weight: 400;\">Lack of understanding:<\/span><br \/>\n<\/i><span style=\"font-weight: 400;\"> Complex technical aspects of cyber security can lead to uncertainty and mistrust, especially among non-technical personnel.<\/span><\/li>\n<li><i><br \/>\n  <span style=\"font-weight: 400;\">Behavior change required:<\/span><br \/>\n<\/i><span style=\"font-weight: 400;\"> Security measures often require changes in employees&#8217; daily behavior, which can create resistance.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-5505-5\" class=\"panel-grid panel-has-style\" data-style=\"{\"padding\":\"60px 0px 60px 0px\",\"background_image_attachment\":false,\"background_display\":\"cover\",\"full_height\":\"\",\"row_stretch\":\"full\",\"cell_alignment\":\"flex-start\",\"disable_row\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\" data-label=\"tekst\">\n<div class=\"siteorigin-panels-stretch panel-row-style panel-row-style-for-5505-5\" data-stretch-type=\"full\">\n<div id=\"pgc-5505-5-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-5505-5-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"7\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<h2 class=\"widget-title\">How can we overcome skepticism?<\/h2>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<ul>\n<li><span style=\"font-weight: 400;\"><strong>Training and Awareness<\/strong>: Organize regular trainings and workshops to educate employees on the latest threats, risks and the role they play in the organization&#8217;s security.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>Transparent Communication<\/strong>: Provide clear and transparent information about the risks the organization faces and how the proposed security measures address those risks.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>Senior Management Involvement<\/strong>: Ensure that the leadership team actively supports and communicates the importance of cyber security. This can increase staff confidence.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><strong>Demonstrate Effectiveness<\/strong>: Provide examples of situations where the security measures have actually helped protect the organization.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Make it <\/span><b>Easy<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Accessible<\/b><span style=\"font-weight: 400;\">: Clear and uncluttered procedures and make the necessary tools and knowledge easily available to employees.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"pg-5505-6\" class=\"panel-grid panel-no-style\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"border_thickness\":\"1px\",\"full_height\":\"\",\"cell_alignment\":\"flex-start\",\"disable_row\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div id=\"pgc-5505-6-0\" class=\"panel-grid-cell\" data-weight=\"1\">\n<div id=\"panel-5505-6-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"8\" data-style=\"{\"background_image_attachment\":false,\"background_display\":\"tile\",\"background_image_size\":\"full\",\"background_image_opacity\":\"100\",\"border_thickness\":\"1px\",\"disable_widget\":\"\",\"disable_desktop\":\"\",\"disable_tablet\":\"\",\"disable_mobile\":\"\",\"disable_logged_out\":\"\",\"disable_logged_in\":\"\"}\">\n<div class=\"so-widget-sow-editor so-widget-sow-editor-base\">\n<h2 class=\"widget-title\">CONCLUSION<\/h2>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n<p><span style=\"font-weight: 400;\">Dealing with <strong>skepticism<\/strong> within organizations regarding cyber security requires a targeted approach that includes training and communication. An organization that incorporates these elements into its strategy will not only reduce resistance but also build a strong cybersecurity culture.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security is critical in the modern world for organizations regardless of their size or industry. It protects sensitive information, ensures business continuity and prevents serious damage to reputation. However, despite growing awareness of the risks, many organizations still experience resistance in the form of skepticism to cyber security. Understanding and addressing this skepticism is [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":8410,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-8529","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Overcoming Skepticism%<\/title>\n<meta name=\"description\" content=\"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Overcoming Skepticism%\" \/>\n<meta property=\"og:description\" content=\"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/\" \/>\n<meta property=\"og:site_name\" content=\"Brooklyn Partners\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-26T10:13:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Evert van Essen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Evert van Essen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/\"},\"author\":{\"name\":\"Evert van Essen\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#\\\/schema\\\/person\\\/e9c5a6586a1420afda82b6ab66bbd7bd\"},\"headline\":\"Overcoming Skepticism\",\"datePublished\":\"2023-09-26T10:13:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/\"},\"wordCount\":349,\"publisher\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Weerstanden-Blogs.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/\",\"url\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/\",\"name\":\"Overcoming Skepticism%\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Weerstanden-Blogs.jpg\",\"datePublished\":\"2023-09-26T10:13:56+00:00\",\"description\":\"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#primaryimage\",\"url\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Weerstanden-Blogs.jpg\",\"contentUrl\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Weerstanden-Blogs.jpg\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/blog\\\/overcoming-skepticism\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Overcoming Skepticism\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/\",\"name\":\"Brooklynpartners\",\"description\":\"Cyber Awareness\",\"publisher\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#organization\"},\"alternateName\":\"BP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#organization\",\"name\":\"Brooklynpartners\",\"url\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/logo_BP-main-L-1.webp\",\"contentUrl\":\"https:\\\/\\\/brooklynpartners.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/logo_BP-main-L-1.webp\",\"width\":1184,\"height\":401,\"caption\":\"Brooklynpartners\"},\"image\":{\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/nl.linkedin.com\\\/company\\\/brooklyn-partners\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/brooklynpartners.com\\\/en\\\/#\\\/schema\\\/person\\\/e9c5a6586a1420afda82b6ab66bbd7bd\",\"name\":\"Evert van Essen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g\",\"caption\":\"Evert van Essen\"},\"sameAs\":[\"https:\\\/\\\/brooklynpartners.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Overcoming Skepticism%","description":"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/","og_locale":"en_US","og_type":"article","og_title":"Overcoming Skepticism%","og_description":"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.","og_url":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/","og_site_name":"Brooklyn Partners","article_published_time":"2023-09-26T10:13:56+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg","type":"image\/jpeg"}],"author":"Evert van Essen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Evert van Essen","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#article","isPartOf":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/"},"author":{"name":"Evert van Essen","@id":"https:\/\/brooklynpartners.com\/en\/#\/schema\/person\/e9c5a6586a1420afda82b6ab66bbd7bd"},"headline":"Overcoming Skepticism","datePublished":"2023-09-26T10:13:56+00:00","mainEntityOfPage":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/"},"wordCount":349,"publisher":{"@id":"https:\/\/brooklynpartners.com\/en\/#organization"},"image":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#primaryimage"},"thumbnailUrl":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/","url":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/","name":"Overcoming Skepticism%","isPartOf":{"@id":"https:\/\/brooklynpartners.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#primaryimage"},"image":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#primaryimage"},"thumbnailUrl":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg","datePublished":"2023-09-26T10:13:56+00:00","description":"We often encounter resistance, a barrier that makes implementing effective cyber security measures difficult. One form of resistance is reactance.","breadcrumb":{"@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#primaryimage","url":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg","contentUrl":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2023\/10\/Weerstanden-Blogs.jpg","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/brooklynpartners.com\/en\/blog\/overcoming-skepticism\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/brooklynpartners.com\/en\/"},{"@type":"ListItem","position":2,"name":"Overcoming Skepticism"}]},{"@type":"WebSite","@id":"https:\/\/brooklynpartners.com\/en\/#website","url":"https:\/\/brooklynpartners.com\/en\/","name":"Brooklynpartners","description":"Cyber Awareness","publisher":{"@id":"https:\/\/brooklynpartners.com\/en\/#organization"},"alternateName":"BP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/brooklynpartners.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/brooklynpartners.com\/en\/#organization","name":"Brooklynpartners","url":"https:\/\/brooklynpartners.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/brooklynpartners.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2024\/01\/logo_BP-main-L-1.webp","contentUrl":"https:\/\/brooklynpartners.com\/wp-content\/uploads\/2024\/01\/logo_BP-main-L-1.webp","width":1184,"height":401,"caption":"Brooklynpartners"},"image":{"@id":"https:\/\/brooklynpartners.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/nl.linkedin.com\/company\/brooklyn-partners"]},{"@type":"Person","@id":"https:\/\/brooklynpartners.com\/en\/#\/schema\/person\/e9c5a6586a1420afda82b6ab66bbd7bd","name":"Evert van Essen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/033ad805c4a12a0292bc08e44d16fe05e190648b97da7a63f0bf5c775a909499?s=96&d=mm&r=g","caption":"Evert van Essen"},"sameAs":["https:\/\/brooklynpartners.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/posts\/8529","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/comments?post=8529"}],"version-history":[{"count":0,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/posts\/8529\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/media\/8410"}],"wp:attachment":[{"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/media?parent=8529"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/categories?post=8529"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/brooklynpartners.com\/en\/wp-json\/wp\/v2\/tags?post=8529"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}