{"id":15911,"date":"2025-04-01T21:49:24","date_gmt":"2025-04-01T21:49:24","guid":{"rendered":""},"modified":"2025-10-22T19:05:27","modified_gmt":"2025-10-23T01:05:27","slug":"b2b-cybersecurity-training-sdsu-researchers-propose-lean-model-solution","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/b2b-cybersecurity-training-sdsu-researchers-propose-lean-model-solution\/","title":{"rendered":"<strong>B2B Cybersecurity Training: SDSU Researchers Propose LEAN Model Solution<\/strong>"},"content":{"rendered":"<p>In the ever-evolving world of digital technology, cybersecurity has become a focal point for businesses, governments, and individuals alike. With an alarming spike in cyberattacks over the past decade, there&#8217;s never been a more pressing time to address this issue. The recent findings from San Diego State University (SDSU) researchers have sparked a renewed sense of urgency, revealing that most B2B cybersecurity training fails. The good news? SDSU&#8217;s proposed LEAN model could offer a solution.<\/p>\n<p><strong><a href=\"https:\/\/www.ameeba.com\/blog\/enhancing-cybersecurity-framework-unpacking-resources-provided-by-the-national-credit-union-administration\/\"  data-wpil-monitor-id=\"18473\">Unpacking the SDSU Cybersecurity<\/a> Study<\/strong><\/p>\n<p>The SDSU research team led by Dr. Murray Jennex evaluated the <a href=\"https:\/\/www.ameeba.com\/blog\/key-lessons-from-cybersecurity-on-effective-crisis-management\/\"  data-wpil-monitor-id=\"20187\">effectiveness of cybersecurity<\/a> training in the B2B sector. The findings were startling. Despite <a href=\"https:\/\/www.ameeba.com\/blog\/google-s-cybersecurity-investment-transforming-millions-into-billions\/\"  data-wpil-monitor-id=\"19812\">investing significant resources into cybersecurity<\/a> training, most businesses were still falling prey to cyberattacks. The research identified common training pitfalls, such as overemphasis on technical details, lack of practical applications, and failure to <a href=\"https:\/\/www.ameeba.com\/blog\/the-cybersecurity-risk-forum-a-crucial-start-to-addressing-cyber-threats\/\"  data-wpil-monitor-id=\"18504\">address the human element of cybersecurity<\/a>.<\/p>\n<p>Drawing <a href=\"https:\/\/www.ameeba.com\/blog\/cybersecurity-experts-unveil-essential-business-protections-insights-from-grand-forks-herald\/\"  data-wpil-monitor-id=\"26433\">insights from experts<\/a>, the team pointed out that these training programs often overlook the importance of ingraining a security-conscious culture within the organization. It&#8217;s an alarming revelation that underscores the need for a more effective <a href=\"https:\/\/www.ameeba.com\/blog\/quantum-cybersecurity-a-revolutionary-approach-to-data-protection\/\"  data-wpil-monitor-id=\"20419\">approach to cybersecurity<\/a> training.<\/p>\n<p><strong>Industry <a href=\"https:\/\/www.ameeba.com\/blog\/aca-concludes-cybersecurity-and-risk-forum-implications-and-future-strategies\/\"  data-wpil-monitor-id=\"23625\">Implications and Potential Risks<\/a><\/strong><\/p><div id=\"ameeb-3208448280\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/fbi-probes-minnesota-cybersecurity-expert-an-in-depth-analysis-of-the-event-and-its-implications-on-cybersecurity-industry\/\"  data-wpil-monitor-id=\"19845\">implications of ineffective cybersecurity<\/a> training go beyond individual companies. In a hyper-connected business environment, one weak <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-58746-privilege-escalation-vulnerability-in-volkov-labs-business-links-panel-for-grafana\/\"  data-wpil-monitor-id=\"88548\">link can compromise the entire business<\/a> network, leading to substantial financial and reputational damage. Stakeholders ranging from customers, employees, to investors are affected by a <a href=\"https:\/\/www.ameeba.com\/blog\/fortra-s-double-triumph-2025-cybersecurity-excellence-awards-for-best-cybersecurity-company-and-email-security\/\"  data-wpil-monitor-id=\"21078\">company&#8217;s cybersecurity<\/a> posture.<\/p>\n<p>In the worst-case scenario, cyberattacks can <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2023-33113-memory-corruption-vulnerability-leading-to-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"31468\">lead to the exposure of sensitive data<\/a>, interruption of business operations, and even cause businesses to shut down. On the other hand, effective cybersecurity training can mitigate these risks, bolstering the resilience of businesses against <a href=\"https:\/\/www.ameeba.com\/blog\/projected-12-2-rise-in-cybersecurity-spending-by-2025-a-response-to-the-ever-evolving-threat-landscape\/\"  data-wpil-monitor-id=\"19609\">rising digital threats<\/a>.<\/p>\n<p><strong>Exploiting <a href=\"https:\/\/www.ameeba.com\/blog\/unpacking-the-javascript-injection-campaign-solar-power-vulnerabilities-and-sim-swap-lawsuit-a-cybersecurity-analysis\/\"  data-wpil-monitor-id=\"19121\">Cybersecurity Vulnerabilities<\/a><\/strong><\/p>\n<p>The type of vulnerabilities exploited in these <a href=\"https:\/\/www.ameeba.com\/blog\/cybersecurity-firm-thwarts-ransomware-attack-warns-potential-targets-a-case-study-in-proactive-defense\/\"  data-wpil-monitor-id=\"19367\">cases varies from phishing attacks<\/a>, ransomware, to social engineering tactics. However, the study found that the primary weakness lies not in the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-7093-critical-vulnerability-in-belkin-f9k1122-1-00-33-impacting-system-security-and-data-integrity\/\"  data-wpil-monitor-id=\"91148\">security systems<\/a> themselves, but in the human element. This weakness is often exploited by cybercriminals, as they bank on the lack of <a href=\"https:\/\/www.ameeba.com\/blog\/bank-of-thailand-and-ais-join-forces-for-cybersecurity-awareness-among-thai-youth\/\"  data-wpil-monitor-id=\"25432\">awareness and cyber hygiene among<\/a> employees.<\/p>\n<p><strong>The Legal, Ethical, and Regulatory Landscape<\/strong><\/p><div id=\"ameeb-2865825208\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>Ineffective <a href=\"https:\/\/www.ameeba.com\/blog\/rhode-island-s-comprehensive-cybersecurity-measure-a-long-awaited-victory-against-cyber-threats\/\"  data-wpil-monitor-id=\"18525\">cybersecurity training not only exposes businesses to cyber<\/a> threats but also potential legal and regulatory consequences. Laws such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) mandate companies to take reasonable steps to protect consumer data, including effective <a href=\"https:\/\/www.ameeba.com\/blog\/free-online-cybersecurity-training-a-progressive-step-by-uh-maui-college\/\"  data-wpil-monitor-id=\"21394\">cybersecurity training<\/a>. Non-compliance could result in hefty fines, lawsuits, and a tarnished reputation.<\/p>\n<p><strong>The LEAN Solution: A New <a href=\"https:\/\/www.ameeba.com\/blog\/microsoft-s-ai-driven-approach-to-amplify-cybersecurity-protections\/\"  data-wpil-monitor-id=\"23624\">Approach to Cybersecurity<\/a> Training<\/strong><\/p>\n<p>SDSU&#8217;s <a href=\"https:\/\/www.ameeba.com\/blog\/strengthening-cybersecurity-for-the-988-suicide-crisis-lifeline-an-analysis-of-padilla-and-mullin-s-proposed-bill\/\"  data-wpil-monitor-id=\"21393\">proposed LEAN model offers a fresh perspective on cybersecurity<\/a> training. It advocates for a comprehensive approach that addresses the technical, practical, and human <a href=\"https:\/\/www.ameeba.com\/blog\/unveiling-the-key-aspects-of-mts-cybersecurity-requirements-outlined-by-national-law-review\/\"  data-wpil-monitor-id=\"31467\">aspects of cybersecurity<\/a>. The model encourages businesses to Learn about <a href=\"https:\/\/www.ameeba.com\/blog\/ransomware-claims-and-data-leak-threats-a-comprehensive-analysis-of-the-lee-enterprises-cyber-attack\/\"  data-wpil-monitor-id=\"19027\">cyber threats<\/a>, Evaluate their cybersecurity posture, Apply security measures, and Nurture a security-conscious culture.<\/p>\n<p>Businesses can use <a href=\"https:\/\/www.ameeba.com\/blog\/white-house-signal-mishap-a-case-study-in-the-importance-of-secure-communication-channels\/\"  data-wpil-monitor-id=\"18927\">case studies<\/a> of companies that successfully implemented the LEAN model or similar frameworks to guide their own cybersecurity training programs. Companies like IBM and Microsoft have shown the efficacy of such an approach, averting potential <a href=\"https:\/\/www.ameeba.com\/blog\/unmasking-the-russian-cyber-threat-the-weaponization-of-microsoft-management-console-flaw\/\"  data-wpil-monitor-id=\"19178\">cyber threats<\/a> and reducing incidents of security breaches.<\/p>\n<p><strong>Looking into the <a href=\"https:\/\/www.ameeba.com\/blog\/unmasking-the-nyu-cybersecurity-breach-of-2025-a-comprehensive-analysis-and-future-outlook\/\"  data-wpil-monitor-id=\"18772\">Future of Cybersecurity<\/a><\/strong><\/p>\n<p>The SDSU study is a wake-up call for businesses and the <a href=\"https:\/\/www.ameeba.com\/blog\/weekly-cybersecurity-roundup-politico-s-deep-dive-into-high-profile-attacks-and-industry-trends\/\"  data-wpil-monitor-id=\"19366\">cybersecurity industry<\/a>. It underscores the <a href=\"https:\/\/www.ameeba.com\/blog\/enhancing-k-12-cybersecurity-the-urgent-need-to-protect-smaller-state-and-local-entities\/\"  data-wpil-monitor-id=\"24804\">need for a more holistic approach to cybersecurity<\/a> training, one that includes emerging technologies like AI, blockchain, and zero-trust architecture. The LEAN model can serve as a guideline for <a href=\"https:\/\/www.ameeba.com\/blog\/nordlayer-a-game-changer-in-business-cybersecurity-a-comprehensive-review\/\"  data-wpil-monitor-id=\"21276\">businesses to revamp their cybersecurity<\/a> training, ensuring they are prepared for the ever-evolving digital threats.<\/p>\n<p>In conclusion, <a href=\"https:\/\/www.ameeba.com\/blog\/langevin-s-unwavering-commitment-to-cybersecurity-amid-congressional-duties\/\"  data-wpil-monitor-id=\"37419\">cybersecurity is not a one-off task but an ongoing commitment<\/a>. By embracing innovative models like LEAN, businesses can cultivate a <a href=\"https:\/\/www.ameeba.com\/blog\/strengthening-cybersecurity-resilience-in-healthcare-the-prescription-for-a-robust-defense\/\"  data-wpil-monitor-id=\"20735\">robust cybersecurity<\/a> culture, protect their digital assets, and ultimately, stay ahead of the cybersecurity curve.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the ever-evolving world of digital technology, cybersecurity has become a focal point for businesses, governments, and individuals alike. With an alarming spike in cyberattacks over the past decade, there&#8217;s never been a more pressing time to address this issue. The recent findings from San Diego State University (SDSU) researchers have sparked a renewed sense [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[82],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-15911","post","type-post","status-publish","format-standard","hentry","category-uncategorized","vendor-microsoft"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/15911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=15911"}],"version-history":[{"count":28,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/15911\/revisions"}],"predecessor-version":[{"id":84167,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/15911\/revisions\/84167"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=15911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=15911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=15911"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=15911"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=15911"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=15911"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=15911"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=15911"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=15911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}