In the modern enterprise, security teams are winning the battle for "compliance" but losing the war for "safety." New research conducted by StrongestLayer, analyzing over 15,000 industry respondents across 15 global surveys, reveals a disturbing trend: The Security Paradox.
The paradox is simple yet devastating: As organizations layer on more security tools—stricter email filters (SEGs), heavier VPNs, and aggressive DLP agents—they inadvertently increase "friction" for employees. This friction does not stop risky behavior; it merely drives it underground.
Our data shows that 61% of employees are dissatisfied with their corporate technology, leading to a projected 75% adoption rate of Shadow IT by 2027. Furthermore, the culture of "blame" has created a Silence Spiral, where 50% of employees are too afraid to report security mistakes, leaving organizations blind to active breaches.
This report breaks down the hidden costs of "strict" security—from the epidemic of False Positives to the psychological erosion of trust—and offers a roadmap for a new, context-aware approach that aligns security with the speed of business.
For the last two decades, cybersecurity strategy has been defined by a single metaphor: The Castle.
The logic was straightforward. If we build higher walls (Firewalls), dig deeper moats (VPNs), and guard the gate more aggressively (Email Gateways), we will keep the bad guys out. We treated the enterprise like a fortress and the employees like the villagers we were protecting.
But in 2026, the Castle model collapsed.
The modern workforce is not inside the castle. They are remote, mobile, and distributed. They are working from coffee shops in Singapore, home offices in London, and coworking spaces in New York. They are using SaaS applications (Salesforce, Slack, Zoom) that live in the cloud, not in your data center.
When we try to apply "Castle" security to a "Cloud" world, we create Friction.
The result? The "villagers" are revolting. They aren't trying to destroy the castle; they are just trying to do their jobs. But to do so, they are bypassing the guards.
This report is not about "Hackers" or "Malware." It is about the Operational Reality of security. It is about what happens when your security policies collide with human nature.
Before we dissect the failure of modern security policies, we must validate the data. In an industry full of vendor-sponsored "fluff," this report stands apart because of its scope.
We did not just ask 100 CISOs what they thought was happening. We aggregated insights from 15,000 respondents across the globe. This dataset provides a rare 360-degree view of the enterprise.
Most security reports suffer from "Survivorship Bias." They only analyze the threats that were caught. They don't analyze the threats that were ignored or the policies that were bypassed. By surveying the end-users—the marketing manager trying to send a large file, the sales director waiting for a contract—we have uncovered the Hidden Cost of Security.
If you ask a legacy security vendor what their success metric is, they will say: "We blocked 99.9% of threats."
But if you ask a CEO what their success metric is, they will say: "We closed the deal."
These two metrics are currently at war. The most immediate finding from our research is that legacy security tools are too aggressive. The #1 frustration cited by leadership is not "phishing attacks"—it is "Missing Emails Due to False Positives."
Our data reveals that 40% of CIOs receive frequent, high-priority complaints about legitimate business emails being blocked by their Secure Email Gateway (SEG).
Why is this happening? Why can't billion-dollar security tools tell the difference between a hacker and a client?
When a security tool blocks a legitimate email, it isn't just a technical glitch; it's a business failure.
A "False Positive" in cybersecurity occurs when a security system incorrectly identifies benign activity as malicious. In 2026, false positives are the primary driver of friction between Security Operations Centers (SOC) and business units, often leading to the adoption of "Shadow IT" communication channels.
When the "official" way of working is broken (slow VPNs, blocked files, quarantined emails), employees do not stop working. They simply find a new way to work.
This is the birth of Shadow IT.
Our research tracks the adoption of unauthorized SaaS applications over a 5-year period. The trend line is undeniable and accelerating:
Security teams often view Shadow IT as "Reckless Behavior." Our data suggests it is actually "Rational Behavior."
Consider this scenario:
The Hard Truth: Shadow IT is a rational economic response to bad IT policy. If you make security hard, you make insecurity inevitable. By 2027, if your security tools are not as frictionless as consumer apps, they will be bypassed by 75% of your workforce.
We asked our 15,000 respondents to rank the specific "friction points" that make them hate their corporate security. These are the barriers that drive the Shadow IT explosion.

Rank #3 (Slow VPNs) is a critical infrastructure failure. Traditional VPNs were designed when 90% of traffic was internal (Employee ⇒ Data Center). Today, 90% of traffic is external (Employee ⇒ Internet/SaaS).
Forcing a Zoom call to travel from a user's home ⇒ Corporate VPN ⇒ Internet ⇒ Zoom Server adds massive latency.
This is perhaps the most critical finding in the entire "Hidden Cost of Security" report. It is not a technology problem; it is a psychological problem.
The Statistic: 50% of employees fear negative repercussions if they report a security mistake.
Imagine an employee clicks a link in an email. A second later, they realize, "Oh no, that looked fake."
Scenario A: The Fear Culture (Current State)
Scenario B: The Psychological Safety Culture (Desired State)
For a decade, the industry has relied on simulated phishing campaigns to "train" employees.
Our data suggests this has backfired. Instead of teaching employees how to spot threats, it has taught them to fear the security team. When 50% of your workforce is afraid to talk to you, you don't have a security program; you have a surveillance program. You have blinded yourself to the most valuable sensor network you have: your people.
We cannot solve the Security Paradox by adding more blocking rules. We must shift the paradigm from Static Security to Context-Aware Security.
The goal is not to lower the walls, but to make the gates smarter.
Legacy SEGs use "Signature Detection" (Is this IP bad? Is this keyword bad?). This is prone to error.
You cannot block 75% of the internet. If you try to block Dropbox, users will find Box. If you block Box, they will use Google Drive.
To break the Silence Spiral, organizations must guarantee immunity for self-reporting.
The trajectory is clear. The "Security Paradox" will either be the catalyst for change, or the cause of the next great data breach.
By 2027, we predict a bifurcation in the market:
StrongestLayer is building for the Fluid future. We believe that the best security is the kind you don't notice until you need it.
The era of the "Department of No" is over.
As we move toward 2026, the metrics of success for a CISO are changing. It is no longer about "How many threats did we block?" It is about "How fast did we allow the business to run safely?"
The data from our 15,000 respondents is a wake-up call: Friction is the enemy.
If we continue to treat employees as the "weakest link" and subject them to 40% false positives and punitive policies, they will continue to bypass us. But if we align security with productivity—using intelligent, invisible layers of protection—we can finally close the gap on Shadow IT and build an enterprise that is both fast and secure.
Rankings based on measured operational impact, adoption of circumvention behaviors, and organizational scope of effect. Research conducted December 2025 - January 2026.
The Security Paradox is a cybersecurity phenomenon where the implementation of stricter security controls (such as aggressive email filtering, complex password policies, and VPNs) inadvertently decreases overall organizational safety. This occurs because high-friction policies force employees to bypass security protocols using unauthorized tools ("Shadow IT"), leaving the organization blind to new risks.
According to StrongestLayer's 2026 research, Shadow IT usage is currently at 60% and is projected to reach 75% by 2027. This represents a massive increase from just 41% in 2022, driven largely by employee dissatisfaction with corporate IT tools.
The primary driver of security bypass is productivity friction. Our data shows that 61% of employees are dissatisfied with the technology provided by their IT departments. When security tools block legitimate work (False Positives) or slow down connections (VPN latency), employees behave rationally and switch to personal devices or unauthorized apps to meet their deadlines.
False positives—when a security tool incorrectly blocks a safe email—are the #1 frustration for CIOs in 2026. 40% of IT leaders report that false positives disrupt critical business operations, leading to lost revenue, delayed contracts, and supply chain friction.
The "Silence Spiral" refers to a culture where employees are afraid to report security mistakes (like clicking a phishing link) due to fear of punishment or shaming. Research shows that 50% of employees fear repercussions for reporting errors. This is dangerous because it leads to "silent breaches," where malware dwells undetected in a network for weeks because the only witness—the employee—was too terrified to speak up.
Be the first to get exclusive offers and the latest news
Tomorrow's Threats. Stopped Today.
Tomorrow's Threats. Stopped Today.