The security world abounds with case studies demonstrating that end users are a weak point within the organization. Despite significant efforts, end user security issues continue to stymie even the most well-funded and resourceful security teams. Perhaps we need to adjust how we interact with end users. A feedback loop consists of four unique stages: Conveying information to the end user in a manner that is easy to understand. The more closed the feedback loop is, the more likely the user behavior will be adjusted.”]
Source: https://securityintelligence.com/using-feedback-loops-to-enhance-end-user-security/

