Cyber & Data Security

Do you know why hackers LOVE your new staff members?

This article was updated on:
Oct 1st, 2025

Why Do Cyber Criminals Target Your New Staff?

 

Bringing a new hire onboard is always exciting. You are sorting their laptop, email login, system access, and maybe even lining up the biscuit tin for that all-important welcome cuppa.

 

But here is the part most businesses overlook. Those first few months in a role are one of the riskiest times for your cyber security.

 

And guess what? Cyber criminals know it.

 

How do hackers know you have new starters?

It's simple. New team members often announce their new role on LinkedIn or other social platforms. Criminals watch those posts closely and before you know it your newest employee is on their hit list, and your company is now their next target.

 

Why are new starters such easy targets?

 

Research shows that 71% of new employees fall for phishing or social engineering attacks in their first 90 days.

 

Think back to your own first weeks in a new role:

• You are keen to prove yourself.

• You do not know all the processes yet.

• You are eager to follow instructions.

• You want to get things right.

 

That mix of enthusiasm and uncertainty is exactly what cyber criminals exploit.

 

They send emails that look like they come from HR, IT support, or even senior managers. These messages might ask for logins, payment details, or urgent help with a task. Because new hires do not yet know what is normal or who is who, they are much more likely to click.

 

Statistically, new hires are 44% more likely to fall for phishing links and they are more likely to believe fake emails from the boss than experienced colleagues. That is a big gap and it leaves your business exposed.

 

The good news - it's an easy fix!

Cyber security awareness training should start on day one of onboarding.

If you do this, you can fast track their knowledge and reduce the chances of a phishing incident.

That means:

✅ Teaching staff how to spot phishing attempts.

✅ Explaining what normal communication looks like in your business.

✅ Making sure they know who to talk to if something feels suspicious.

 

Companies that build this into onboarding see huge benefits. With the right training, staff can become six times better at spotting phishing within six months, which cuts incidents by an impressive 86 percent.

 

That is a huge win for a small investment of time.

Think about your People first, and technology second!

 

Yes, firewalls, antivirus software, and security tools are vital. But they cannot stop every cleverly disguised scam. People are always your first line of defence, and right now your newest hires may be your weakest link.

 

Invest in them, provide the tools, give them the opportunity to build up their confidence in being able to spot a phishing email, and they will not only protect themselves but your business from day 1.

Do this, and you will strengthen your entire security culture 🎉

 

👉 At Southern IT, we help businesses make cyber security part of the culture from the very first login. If you would like to chat about how to build a stronger and safer team, get in touch. We are here to help 👈

Keen to learn more? Explore our other related resources below:
July 1, 2025
How Might Hackers Exploit My Cyber Security? 7 Tricks Small Business Owners Need-To-Know!
Cyber & Data Security
May 1, 2025
MFA Isn’t Optional Anymore: Here’s Why
Cyber & Data Security
IT Management, Policies & Certifications
April 1, 2025
Why Digital Offboarding Needs to Be on Your Radar!
Cyber & Data Security
February 12, 2025
Upgrading to Windows 11: It’s ESSENTIAL, Let us explain why!
Cyber & Data Security
February 1, 2025
11 Simple Steps to Keep Your Microsoft 365 Data Safe
Cyber & Data Security
Microsoft 365
May 23, 2022
The 5 Benefits of Outsourcing IT Support
IT Management, Policies & Certifications
Cyber & Data Security
May 12, 2021
Cyber Essentials Toolkit
Cyber & Data Security
April 19, 2021
Why your Business needs Microsoft 365 Backup
IT Management, Policies & Certifications
Cyber & Data Security
March 4, 2021
Is Microsoft 365 Secure? Our 5 Essential Tips to Stay Safe
Microsoft 365
Cyber & Data Security
February 1, 2021
Free Cyber Security Awareness Training!
Cyber & Data Security
December 20, 2020
Why Do Businesses Only Care About Cyber Security Once They Get Hacked?
Cyber & Data Security
October 17, 2019
Ransomware – Should You Be Worried? 
Cyber & Data Security
August 12, 2019
Identity Fraud - Easier Than Ever
Cyber & Data Security
March 28, 2019
Invoice Diversion Scenario
Cyber & Data Security
March 26, 2019
Phishing/Ransom Attack Scenario, What Would You Do?
Cyber & Data Security
March 13, 2019
The difference between Cyber Essentials and Cyber Essentials PLUS
Cyber & Data Security
December 13, 2018
Password ‘Sextortion’ and Ransomware
Cyber & Data Security
December 4, 2018
What is the Difference Between Penetration Testing and Vulnerability Scanning?
IT Management, Policies & Certifications
Cyber & Data Security
November 28, 2018
How Secure is My Password?
Cyber & Data Security
November 2, 2018
How much help do I need to get Cyber Essentials Certified?
Cyber & Data Security
October 23, 2018
What is an SSL certificate and why do I need one?
IT Management, Policies & Certifications
Cyber & Data Security
October 3, 2018
Defining the Scope for Cyber Essentials
Cyber & Data Security
October 1, 2018
Is it time to switch your IT partner?
Cyber & Data Security
October 1, 2018
The Facebook Breach: This is What You Need to do NOW...
Cyber & Data Security
September 20, 2018
Email Spoofing Scenario
IT Management, Policies & Certifications
Cyber & Data Security
August 24, 2018
What is OneDrive and why should my business be using it? 
Telecoms & Connectivity
Cyber & Data Security
August 20, 2018
What is GDPR?
Cyber & Data Security
August 15, 2018
Server VS Cloud - Which is best for your business?
Telecoms & Connectivity
Cyber & Data Security
August 14, 2018
Why Should I get my business Cyber Essentials certified?
Cyber & Data Security
August 14, 2018
How Much Does Outsourced IT Support Cost in 2023?
IT Management, Policies & Certifications
Cyber & Data Security
May 1, 2018
The Difference between NCSC Small Business Guide & Cyber Essentials
Cyber & Data Security
December 2, 2017
Cyber Essentials Certification: Everything You Need to Know
Cyber & Data Security
January 22, 2009
Are there any substitutes to ISO 27001 suitable for my business?
Cyber & Data Security
IT Management, Policies & Certifications