Employee Login

Enter your login information to access the intranet

Enter your credentials to access your email

Reset employee password

Article

Cybersecurity and Reputation in 2026: Surfing into the Wave 

January 29, 2026
By Scott Radcliffe

While we’re well past Larry David’s threshold to wish “Happy New Year,” 2026 is still fresh and there will be some trends communications leaders should be very prepared for as cybersecurity and corporate reputation continues to be more firmly intertwined. What’s more, these trends are evolving quickly and in a way that should make most PR leaders question assumptions they’ve made for cybersecurity-related communications even just a few years ago.  

We’ll likely find the organizations that emerge with their reputations intact—or even enhanced in some cases—are those that recognize a simple truth. Specifically, that in the age of growing and ever-present cybersecurity threats, your communication strategy is nearly as important as your firewall configuration. 

The Trends

Show Your Work, Not Just Your Confidence: Soon it will no longer be enough to simply say your products or services are “secure,” you need to demonstrate it with specificity and honesty. This means highlighting the good with the bad and providing meaningful detail about your offerings. Companies like Anthropic are leading the way by openly discussing safety concerns with their AI models, while Amazon has been transparent about potentially malicious activity it has detected and mitigated in its network. The market is rewarding this kind of candor because it builds credibility and ultimately trust. Security is a journey, not a destination, so no one expects their security vendor to have a perfect record. They do expect them to quickly and effectively address vulnerabilities. 

Supply Chain Security as a Diplomatic Balancing Act: Supply chain security is already a fundamental area of corporate risk, but it is likely to continue to grow as cybercriminals become more creative and effective in exploiting vendors across corporate supply chains. Because these types of issues have only grown in frequency and impact, the way in which organizations communicate to core stakeholders about them will also need to change in 2026. The line between accountability and “throwing suppliers under the bus” is beginning to grow very blurry and will depend even more on the facts on the ground in the coming year. Moving forward, organizations should approach communications related to these situations with considerable nuances. Letting the facts of the matter drive the narrative rather than reflexive blame-shifting that could backfire with partners and customers alike if pre-packaged approaches are applied. 

The Race to Disclosure Amidst a Sea of Data Extortion Attacks: Bad actors are doubling down on data theft and extortion rather than deploying traditional ransomware. In this environment, companies need to realize they aren’t alone—and many who are targeted actually stand out in a positive way if they choose not to pay and instead disclose the issue before the bad actors. Speed and a degree of transparency can transform a potential reputation crisis into a demonstration of organizational integrity. This trend also extends beyond data extortion attacks. In recent years, many companies received positive feedback for proactively disclosing security issues early when they pose an immediate threat or have immediate impacts on users, even when not legally required to do so. 

Reputation in the Age of Hacking Back: In the geopolitical West, and particularly in the U.S. of late, state-backed offensive cyber action and overall aggressiveness—including “hacking back” and hawkish, nationalistic perspectives—is gaining momentum. Brands operating in this sphere directly or tangentially face complex decisions. Specifically, how do you want to position your organization in this increasingly militarized cyber domain while protecting your reputation? Also, how that decision will need to be framed and communicated in a way that aligns with their existing brand reputation or the trajectory they want their reputation to take. 

It’s Past Time to Stop Saying, “We take security seriously:” Using that phrase increasingly carries with it a subtext that suggests you’re simply cutting and pasting what everyone else says and in fact do not take security “seriously.” Furthermore, for a while it has also underscored a lack of authentic engagement with the issue for press, but increasingly with other important stakeholders, which can undermine trust with your key audiences as opposed to building trust. 

The Bottom Line 

The companies that will thrive in 2026’s cybersecurity landscape won’t necessarily be those that never experience incidents. They’ll be the ones that communicate about them with honesty, speed and strategic clarity. Reputation is no longer built on projecting invulnerability; it’s earned through demonstrating resilience, accountability and respect for those who trust you with their data. 

Your security posture and communication strategy are now inseparable. Make sure they’re both ready. 

Scott Radcliffe width= Scott Radcliffe is FleishmanHillard’s global director of cybersecurity, leading the firm’s Cybersecurity Center of Excellence and advising clients on rising cyber risks. He recently rejoined FH from Apple, where he led cybersecurity communications and previously served as the agency’s senior global data privacy and security expert.

 
Article

Don’t Blame Users, Equip Them: A Smarter Approach to Cybersecurity

October 21, 2025
By Scott Radcliffe

There has never been a more challenging time to be a user on a corporate network. Ransomware and extortion gangs are now billion-dollar businesses built in part by targeting individuals—sometimes even highly privileged users—to steal corporate data. Now, with a big assist from AI, barriers to entry have flattened and cybercriminals have gotten even better at targeting and tricking people into giving them sensitive data.

Why cybersecurity employee awareness matters

It can be easy for organizations to feel like the answer is bigger, better and more agile technical defensive solutions. While those are essential and have adapted at a staggering rate, they are not enough due in part to the defender’s use of AI. Almost as important is recognizing that technical solutions alone are insufficient. Engaging corporate users (employees) more effectively may require not just new tools, but a change in outlook as well as approach.

As attackers seek more effective and creative ways to bypass technical defenses, often by tricking users, we need to update our approach to helping organizations fight back.

Limitations of periodic cybersecurity trainings

Study after study shows pretty clearly that the old approach to employee cybersecurity education and training just isn’t working. Worse, a healthy dose of fatalism can creep into the mindset of security teams. This thinking resigns them to the notion that user mistakes are generally unavoidable. Collectively throwing up our hands and giving up isn’t an option. It’s time to think more creatively about employee cybersecurity education and training. While the substance of training is important, organizations often focus so much on what information needs to be shared that they neglect to consider how to effectively engage their intended audience.

Making users click through a cybersecurity awareness training session once a year, then testing them at the end or with simulated phishing exercises, isn’t good enough. We should view cybersecurity training and education for employees not as a singular task, but as a communications campaign that requires design and delivery to maximize stakeholder retention of its key messages. That means more frequent, concise and engaging initiatives, rooted in insights specific to your organization, tailored to unique audiences and delivered across multiple platforms.

Empowering employees for better cybersecurity outcomes

Designing your security with the understanding that compromised user accounts are frequently the way threat actors breach corporate environments isn’t the same as treating user security risk like it’s a hopeless problem. This issue is too important, especially now, to view any other way. It’s a collective responsibility, one that leverages the skills and expertise from across the organization to help mitigate a core source of organizational risk.

Bottom line: Humans aren’t perfect, and they’ll continue to make mistakes. Bad actors will continue to be creative, tricking a platform provider’s helpdesk to give them access to customer data or offering corporate users a cut of any ransom to extort from the user’s employer, or in any number of other ways.

It’s time to find better ways to arm users with the knowledge they’ll need to fight back.

Opportunities exist to help organizations plan and execute a strategic approach to cybersecurity education so that employees cannot only access but also retain the right information.

To learn more, contact [email protected] or [email protected]

Scott Radcliffe width= Scott Radcliffe is FleishmanHillard’s global director of cybersecurity, leading the firm’s Cybersecurity Center of Excellence and advising clients on rising cyber risks. He recently rejoined FH from Apple, where he led cybersecurity communications and previously served as the agency’s senior global data privacy and security expert.

 
Article

The Friends You Never Knew You Needed: Why IT and Communications Must Team Up

July 24, 2025
By Scott Radcliffe

Trust is at the heart of every successful organization. In today’s digital landscape, that trust is built—and sometimes shattered—by how well you protect the data on your network. Reputation is hard-won and easily lost, making it a favorite pressure point for cybercriminals and regulators alike.

Over the past several years, threat actors have shifted tactics. Rather than relying solely on operational disruptions driven by ransomware, groups like Lapsu$ have gone as far as exposing sensitive corporate data without warning or attempted extortion, as seen in their attacks on some of the tech industry’s top companies.

At the same time, regulators and government officials are turning to more and more public responses related to cybersecurity, tightening their grip on corporate reputations through new rules and public scrutiny. With more stringent regulations and increased public reporting, organizations are being held accountable for how they manage and protect sensitive information. Meanwhile, a more cyber-savvy and skeptical public is quick to notice, and react to, any missteps.

Reputation and Technical Cyber Risk: A New Partnership

As the link between reputation and cyber risk grows stronger, IT and Communications teams can no longer afford to operate in silos. Their collaboration should go far beyond crafting post-incident press releases. Here’s how these two critical teams can—and should—work together:

  1. Translate Complexity into Clarity:
    Technical teams understand the risks. Communications teams know how to craft messages that resonate. Together, they can ensure clear, concise explanation of core policies, risks, and responses both internally and externally.
  2. Build a Culture of Security:
    It’s not just about what you say, but how you make it stick. Developing a thoughtful strategy for culture change ensures that security messages are truly internalized throughout the organization.
  3. Plan for the Unexpected:
    Effective scenario planning for data security and privacy risks requires tight coordination. Legal, technical, and Communications teams must work hand-in-hand to prepare for—and respond to—potential crises.

The Benefits of Collaboration

When IT and Communications join forces, the results are tangible:

  • Stronger organizational alignment and buy-in
  • Increased compliance with policies and regulations
  • Faster, more effective crisis response

The specifics of this collaboration will vary but the playbook begins with early alignment on goals, KPIs, desired outcomes and a plan for communicating information to the appropriate stakeholders. Starting before a crisis hits ensures everyone in the organization is working towards shared outcomes.

The threat landscape is only growing more complex and dangerous. While technical defenses are essential, they’re not enough on their own. Real security comes from building awareness, engagement and trust across every level of your organization.

If cybercriminals are evolving their tactics, organizations must evolve, too—not just in how they defend against attacks, but in how they think about and communicate cyber risk.

Scott Radcliffe width= Scott Radcliffe is FleishmanHillard’s global director of cybersecurity, leading the firm’s Cybersecurity Center of Excellence and advising clients on rising cyber risks. He recently rejoined FH from Apple, where he led cybersecurity communications and previously served as the agency’s senior global data privacy and security expert.

 
Article

Protecting Relationships During a Cyber Crisis

June 3, 2025
By Cody Want

When a cyber incident hits, IT and legal are often the first to get the call—for good reason. IT teams must act swiftly to contain, remediate and investigate the breach, while legal teams must ensure compliance with regulatory and contractual obligations and manage legal exposure.

But a strictly technical or legal lens can narrow your field of vision. Without broader perspective, you risk overlooking the long-term impact on trust and reputation. In the critical early hours of a response, you need someone in the room to ask: “Now that we know what we’re required to do—what else should we do?”

How you manage the technical and procedural aspects of a cyber incident is essential—it’s foundational to restoring operational confidence. But reputation isn’t built on competence alone; it’s a true test of values. In a crisis, stakeholders are paying attention not only to what you do, but how you engage—and whether your actions reflect the commitments you’ve made in steadier times. The impressions formed in these moments of uncertainty can endure far beyond the incident itself.

Think of cyber incident response as a three-legged stool: IT, legal and communications. Without that third leg, your response may be technically compliant—but misaligned and disconnected from the broader reality of stakeholder expectations. That imbalance can compound risk.

Communicating through a cyber crisis is rarely straightforward. There’s significant pressure to provide clarity on the situation, but forensic investigations take time, threat actors cover their tracks and facts change. The difficulty of navigating these considerations—and the potential impact of a misstep—doesn’t mean you should downplay the need to communicate. It means it’s more important than ever to fill that space, especially when the demand for communications is highest.

That complexity isn’t a reason to step back from communication—it’s a signal to step in more thoughtfully. In moments of high uncertainty, demand for transparency rises.

The right communications strategy acknowledges these challenges while ensuring that trust and relationships aren’t casualties of the crisis. Here are three principles to guide your approach:

  • Be stakeholder-centric: Start with a clear understanding of who your stakeholders are and what they need to hear from you. Reputation is shaped in the details of how you communicate—how you time employee updates, brief partners and how you equip and support customer-facing teams.
  • Avoid media tunnel vision: The headlines matter, but they’re not the whole story. In most incidents, your long-term reputation is shaped more by internal and stakeholder communications than by a single news cycle. Media relations is just one part—often a small part—of a much broader response.
  • Think of future conversations: Imagine explaining your decisions months from now to a key stakeholder. They might not be fully satisfied, but will they understand and respect how you handled the situation given the constraints you were facing?

When and How to Communicate

Cyber incidents create uncertainty. If you don’t provide information to your stakeholders, others will do it for you—customers on social media, employees in break rooms, journalists on deadline.

More On Planning For Uncertainty: Meet the Global Executive Advisory

This doesn’t mean sharing everything, with everyone, all at once. It means thoughtfully assessing what your stakeholders likely know or assume, what you know and can responsibly say, and how best to bridge the gap. There’s no perfect answer. Often, it’s a day-by-day judgment call.

Understanding every stakeholder’s perspective and expectations in this level of detail takes work—but it’s work that always pays off. In a crisis, you’ll never regret having spent time preparing your communications strategy.

Some of the key questions to ask:

  • Clients & Partners: Should high-value relationships get a direct update or a 1:1 call? How are you supporting them through operational disruption?
  • Customers: Are they worried about incompetence—or their data? How are you addressing concerns, inquiries, and frustration?
  • Employees: Do they know what they can and can’t say? Are they prepared to respond to external questions or internal uncertainty?
  • Media & Digital: Should you respond to inquiries, or would that validate speculation? How do you monitor and address unverified rumors before they escalate? What should you do about blogs and anonymous accounts?
  • Board & Investors: How do you keep key stakeholders informed without escalating concern or overpromising outcomes?
  • Regulators & Authorities: Beyond mandated disclosures, what messaging aligns with your broader corporate values?
  • Other Key Audiences: Who else expects to hear from you? Have you considered suppliers, industry associations, or even competitors who might be affected?

More Than a Response—A Reputation Strategy

IT and legal are essential to resolving the technical and regulatory dimensions of a cyber incident. But stakeholders don’t measure your performance by minimum requirements—they measure it by how you made them feel. Ask yourself: are you communicating in a way that reassures and retains trust?

The best responses manage short-term pressures without compromising long-term relationships. Even within the constraints of investigation and legal risk, organizations that integrate communications expertise are better positioned to emerge with credibility intact—and often stronger.

Cyber incidents may be inevitable. Reputational damage doesn’t have to be. The real question isn’t just whether you responded— it’s whether you’re responding in a way that strengthens trust and credibility in the long run.

Cody Want Cody Want is FleishmanHillard’s U.S. Cyber Crisis Lead with extensive experience in cyber incident response and preparedness. He has helped clients through a wide range of crisis and issues situations, including undercover media investigations, major restructures, union disputes and many other regulatory and reputational challenges.