March 30, 2026
The Cost We Don’t Count
The Cost We Pretend Doesn’t Exist
Last month a Cyber Lead told me he sleeps next to his phone like it’s a newborn. Not because he loves his job that much, but because he’s terrified the 3 a.m. call will be a breach and, by extension, the end of his career.
It would be funny if it wasn’t true for so many people. TechRadar reports that 84 percent of cyber professionals fear being fired after a breach. Eighty-four percent. That’s not a statistic, it’s a cry for help.
Cyber isn’t just a technical discipline. It’s a mental endurance sport with no off switch, no victory parade, and a fanbase that only shows up when something goes wrong.
Let’s talk about the human cost your organisation might be ignoring, and what you should do before your best people finally burn out and walk.
The Fear Culture That’s Burning Out Cyber Teams
Cyber teams don’t fear breaches. Breaches are inevitable. They fear the post-breach witch hunt where everyone pretends the attackers were stoppable with a bit more elbow grease and a dashboard.
This fear culture creates three predictable behaviours:
- Overwork to the point of exhaustion.
- Reluctance to take risks or innovate.
- Silence when systems or processes are broken.
That last one is dangerous. If your cyber team doesn’t feel safe telling you where the gaps are, your organisation is walking around with its digital fly open.
Leadership Accountability: Stop Outsourcing Blame
There’s a quiet myth in boardrooms that cybersecurity is something you hire smart people to deal with so you can get on with the business of business. That mindset is how breaches turn into catastrophes.
A breach is never the fault of one engineer, one analyst, or one CISO. It’s the result of leadership decisions around budget, culture, priorities, tooling and risk appetite.
So here’s the uncomfortable truth. If your cyber team is terrified of being fired after a breach, the problem isn’t them. It’s you.
Leaders should ask themselves:
- Do we treat breaches as operational incidents or personal failures?
- Do we fund cybersecurity based on risk or based on convenience?
- Do we publicly support our cyber team when things go wrong?
- Do we have a culture that rewards raising concerns?
If any answer feels even slightly awkward, take that as your clue.
The Vendor Stack Isn’t the Solution, The Humans Are
TechRadar notes the overwhelming tool fatigue hitting cyber teams. Too many dashboards, too many alerts, too many shiny tools that don’t integrate properly. The average cyber team isn’t short of tools. They’re short of breathing space.
Throwing another piece of software at a stressed-out analyst is the equivalent of giving a drowning person a heavier backpack. Looks helpful. Isn’t.
You want better cyber outcomes? Invest in:
- Enough headcount so people can sleep.
- Time for training, not just firefighting.
- Psychological safety for reporting issues early.
- Fewer, better, more integrated tools.
Retention in Cyber Isn’t About Pay, It’s About Pressure
Money matters, but it won’t compensate for chronic stress. Cyber professionals leave because they’re exhausted, unappreciated, and constantly blamed for systemic issues outside their control.
The biggest retention strategy in cyber today is simple. Help your people feel safe.
Safe to raise concerns. Safe to sleep. Safe to fail. Safe to be human in a field where everything else feels inhuman.
What Should Leaders Do Now?
If you employ cyber talent, your job isn’t to make them superheroes. It’s to stop treating them like disposable shields. Start with three steps:
- Build a no-blame post-incident culture. Focus on learning, not firing.
- Give your cyber team a seat at the strategic table, not just the ticketing queue.
- Make mental health a budget line, not a brochure message.
Cybersecurity is a resilience game. Resilience comes from people, not products.
The Part Most Leaders Miss
Your cybersecurity posture is only as strong as the person monitoring alerts at 2 a.m. And that person is only as strong as the culture you give them.
If you want to avoid losing your best cyber people, start by protecting them as fiercely as you ask them to protect your organisation.
The attackers aren’t going anywhere. Your people might.
Look after them before someone else does.
Back to news