CYBERSECURITY ACADEMY
Turn your professionals into the first line of defense against digital threats
STUDY
Download the free study, developed in collaboration with Microsoft, and discover the insights.
March 23, 2026
CONTENT CREATED BY:

Table of contents
Cybersecurity in companies is no longer an issue exclusive to the IT department. In 2026, 94% of successful cybersecurity incidents involve human behavior, according to Google Cloudâs Cybersecurity Forecast 2026 report. This means that the true defense perimeter of any organization is not technological: it is the people who make it up.
In this article, we analyze the current state of corporate cybersecurity, the fastest-growing threats this yearâmany of them enhanced by artificial intelligenceâand why continuous training of teams has become the most cost-effective security investment an organization can make.
In January 2026, Google Cloud published its Cybersecurity Forecast 2026 report, developed using Mandiantâs threat intelligence and Googleâs global visibility. The conclusions are clear: while artificial intelligence is democratizing offensive capabilities, the human factor remains the most critical link.
Globally, in the first quarter of 2025, 2,302 victims were listed on data leak sites â the highest quarterly figure since these records began in 2020. Supply chain attacks in the retail and food sectors caused hundreds of millions of dollars in damages in 2025 alone.
In Latin America, the outlook is particularly concerning. The Inter-American Development Bank (IDB) and the OAS warn of a cybersecurity talent shortage that will exceed half a million professionals by 2026. According to Kasperskyâs 2024â2025 report, 48% of companies in LATAM acknowledge that they do not have enough qualified personnel.
| Country | Key Data | Most Affected Sector |
|---|---|---|
| Mexico | 40.6 million attack attempts in the first half of 2025. More than 60% of companies have experienced ransomware or unauthorized access. | Banking, healthcare, and manufacturing |
| Brazil | Cyberattacks increased by 38% year-over-year. 80% of companies experienced at least one incident in the past year. | Financial and technology sectors |
| Colombia | Increase of over 20% in cybercrime, according to the National Police Cyber Center. | Public administration and retail |
When we talk about the human factor in cybersecurity, we are not talking about negligence or lack of intelligence. We are talking about decisions made in fractions of a second, under pressure or without the necessary context to identify a sophisticated threat.
The most common scenarios are: an employee opens a link in an apparently legitimate email from a supplier; receives a call from someone who sounds exactly like their CEO and asks for access credentials; installs an AI agent to automate their work without realizing that the agent has access to sensitive company data.
None of these incidents require a technical failure. All of them require a person to make the wrong decision. And in 2026, attackers are using artificial intelligence to make that decision increasingly difficult to avoid.
âOrganizations must be prepared for threats and adversaries that leverage artificial intelligence,â warned Jon Ramsey, VP & GM of Google Cloud Security, in the Cybersecurity Forecast 2026 report.
Google Cloudâs report identifies a qualitative shift compared to previous years: artificial intelligence is not only increasing the volume of attacks, but also their sophistication. These are the four most relevant threats for companies this year.
Actors such as ShinyHunters âspecialized in data theft and digital extortionâ are accelerating the use of AI-driven social engineering. Their success in 2025 was based on avoiding technical exploits and directly targeting human vulnerabilities. Vishing (voice phishing) now incorporates AI voice cloning, capable of replicating the tone, accent, and speech patterns of company executives. An employee may receive a call that sounds exactly like their CFO requesting an urgent transfer.
As companies adopt internal AI systems, a new category of attack is emerging: prompt injection. These attacks manipulate corporate AI systems to bypass their security protocols and execute hidden attacker commands. They do not require physical access to systems: they are introduced through the very data that the AI system processes.
In 2026, Google Cloud predicts that the proliferation of autonomous AI agents will escalate the âShadow AIâ problem to a critical level. Employees are independently adopting these agents to automate tasks, without corporate approval. The result is invisible and uncontrolled channels for sensitive data, which can lead to data leaks, compliance violations, and intellectual property theft. Banning these agents does not work either: it simply pushes their use outside the corporate network, eliminating any visibility.
Ransomware is not a new threat, but it continues to grow. Google Cloud is explicit in its forecast: âWe expect to see more ransomware and extortion attacks. This problem will continue and increase in 2026.â Retail and food supply chain sectors were particularly affected in 2025, with damages reaching hundreds of millions of dollars.
| Threat Type | How It Works | Employee Warning Signs |
|---|---|---|
| Voice cloning vishing | A call using a synthetic voice from a âmanagerâ requesting credentials or urgent transfers | Unusual urgency, request for sensitive data over the phone, cannot be verified through another channel |
| AI-powered phishing | Personalized emails with real context about the recipient, no spelling errors or classic fraud indicators | Unexpected link, slightly altered sender, request for access or payment |
| Prompt injection | Malicious instructions hidden in documents or data processed by a corporate AI system | AI system responds unexpectedly or requests unusual permissions |
In response to this landscape, Google Cloud is clear in its recommendation: organizations must implement processes with multiple checks and balances to defend against AI-powered social engineering tactics. But none of this works without people trained to recognize threats and respond appropriately.
Cybersecurity training can no longer be a once-a-year generic awareness program. It needs to be a continuous, strategic, and measurable process. That is why isEazy and S2GRUPO âa leading European cybersecurity firmâ have jointly developed the isEazy Cybersecurity School, a training model designed to transform digital culture and reduce human risk within organizations. Learn more about this collaboration â
The model operates across three interconnected layers:
The first level focuses on raising awareness among all employees about real risks. It is not about creating fear, but about building awareness through storytelling based on real cases, recognizable workplace situations, and an emotional connection to risk. The goal is for every individual to understand that they can be a target of an attack and that their behavior matters.
The second level develops specific skills tailored to each profile: general users, middle management, IT/OT staff, compliance and legal teams, and senior leadership. A CFO requires different training than a SOC analyst. Role-based learning paths include competency objectives, practical assessments, and progress tracking.
The third level is aimed at IT professionals and cybersecurity specialists. It includes advanced courses, hands-on labs, and training on the latest attack and defense tactics. This is the level that closes the technical talent gap identified as critical in Latin America by the IDB and the OAS.
Before designing or reviewing your cybersecurity strategy, answer these questions. If most of your answers are ânoâ or âI donât know,â you have work to do:
With all this data, we can reach one conclusion: cybersecurity no longer depends only on technology, but on the people who use it every day. The isEazy and S2GRUPO ebook will help you understand how to actively engage your talent in the digital defense of your organization. Discover how HR and Learning can lead the cultural shift in security, with an approach that is scalable, practical, and aligned with the real challenges of the corporate environment.
The Cybersecurity Forecast 2026 report by Google Cloud makes the situation clear: threats will continue to grow, AI will make them more sophisticated, and the most exploited link will continue to be the human one. But it also highlights something that is often overlooked: the human factor is the only one organizations truly have control over.
Security technology is necessary but not sufficient. Firewalls do not stop an employee from voluntarily giving away their credentials because they believe they are speaking with their boss. Training can.
In an environment where 94% of incidents involve human behavior, where half a million cybersecurity professionals are lacking in Latin America, and where AI is democratizing offensive capabilities, training is not a cost: it is the most cost-effective security investment your organization can make.
Ready to take the next step? Discover the isEazy Cybersecurity School and explore the full cybersecurity course catalog â
Cybersecurity in companies refers to the set of practices, policies, and technologies designed to protect an organizationâs systems, networks, and data from digital attacks. While it has traditionally been managed by IT departments, the current landscape has changed dramatically: according to Google Cloudâs Cybersecurity Forecast 2026, 94% of successful cybersecurity incidents involve human behavior.
This means responsibility no longer lies solely with technical teams, but with every individual in the organization. An employee who clicks on a phishing link, uses a weak password, or accidentally shares credentials can compromise the entire corporate network in a matter of minutes.
Thatâs why continuous cybersecurity training is now a shared responsibility across IT, HR, and every employee.
In 2026, the main cybersecurity threats facing companies fall into four categories. The first is AI-powered social engineering: attackers use artificial intelligence to create highly realistic impersonations of executives or IT staff, particularly through vishing (voice phishing using voice cloning). The second is prompt injection: attacks that manipulate corporate AI systems to bypass security protocols and execute hidden malicious instructions. The third is Shadow AI or Shadow Agents: employees adopting autonomous AI tools without corporate approval, creating invisible channels through which sensitive data can leak. The fourth is ransomware and digital extortion, which, according to Google Cloud, will continue to grow and intensify in 2026. In Latin America, phishing and social engineering remain the dominant attack vectors, with Mexico recording 40.6 billion attack attempts in just the first half of 2025.
Cybersecurity training addresses the most vulnerable link in any organization: people. According to Google Cloudâs Cybersecurity Forecast 2026, 94% of successful incidents involve human behavior, meaning most attacks are not caused by technical failures but by human decisions under pressure or lack of awareness. A continuous training program reduces this risk in three key ways. First, it builds real awareness of how current threats work, including phishing, vishing, and AI-driven social engineering. Second, it develops role-specific skills, since a CEO requires different training than an IT analyst. Third, it establishes habits and response protocols that activate automatically in suspicious situations. Training is not a substitute for security technology, but it is the only measure that directly addresses the human factorâwhere most attacks originate.
Awareness and cybersecurity training are complementary but not the same. Awareness is the first level: its goal is to ensure employees understand that threats exist, how they work, and why they can personally be affected. It typically relies on short content, real-world examples, and phishing simulations. It builds sensitivity to risk but does not develop skills. Training goes one step further by developing concrete abilities to identify threats, respond to incidents, and apply security protocols in daily work. It is role-basedâcovering general users, middle management, IT staff, and executivesâand is assessed through competency evaluations. An effective cybersecurity strategy requires both: awareness prepares the ground, while training builds real response capability. According to Kasperskyâs 2024â2025 report, 48% of companies in LATAM acknowledge they lack sufficiently qualified cybersecurity personnel, highlighting that awareness alone is not enough.