Skip to content
5 min read

The Complete Framework: Your Pre-Communication System for Every Audience

Over the past four days, we've covered research and neuroscience-backed recommendations on making Cybersecurity communications and advice more effective.

Those came from four different domains:

Day 1: InfoSec Advice Fatigue—documented patterns that cause audiences to mentally shut down.

Day 2: Construal Level Theory—concrete language creates psychological proximity; abstract language gets filtered out.

Day 3: Protection Motivation Theory—there's a narrow Goldilocks zone for fear; too little gets ignored, too much triggers defensive shutdown.

Day 4: Cognitive filtering research—differentiation strategies defeat the pattern-matching mechanisms that filter out even excellent messages.

But before we integrate these into a framework, let's be crystal clear about something:

Breaking through InfoSec "Advice Fatigue" isn't a one-time fix.

It's a systematic approach to communication that works at every level of your organization.

This Applies to Every Communication, Every Audience, Every Level

This isn't just about security awareness campaigns or employee training.

This framework applies when you're:

The research on advice fatigue, concrete language, fear calibration, and differentiation applies universally—because psychological mechanisms don't change based on someone's job title.

Whether you're communicating up, down, or sideways in the organization, you're facing the same challenges:

The principles work at every level because human brains work the same way regardless of the business card.

What changes is the application of the principles—and that's what this framework addresses.


The 4-D Framework

The research principles organize into four sequential steps:

1. DIAGNOSE → Assess Audience State

Before you craft any message, understand the fatigue level and filtering mechanisms you're facing.

2. DESIGN → Build Message Content

Apply concrete language principles and fear calibration to the message itself.

3. DIFFERENTIATE → Stand Out from Noise

Use personalization, framing, prioritization, and acknowledgment to defeat pattern-matching.

4. DELIVER → Execute Strategically

Choose timing, frequency, and format that maximize impact and minimize overexposure.

Each step builds on the previous one. You can't effectively differentiate if your message uses abstract language. You can't design well if you haven't diagnosed the audience's fatigue level.

This is a system that adapts to your specific communication context.

STEP 1: DIAGNOSE

What other messages has this audience received recently?

Decision prompts:

Context-specific indicators:


STEP 2: DESIGN

Concrete Language (Day 2)

Replace abstract with specific:

Include:

The 12-year-old test: Could they follow this without asking questions?

Fear Calibration (Day 3)

Calculate Emotional Intensity:

Target ranges:

Fear + Efficacy Formula: Every threat needs a solution (minimum 1:1 ratio)


STEP 3: DIFFERENTIATE

Personalization

Replace "industry statistics" with "OUR audit findings" and "OUR team's actual incidents"

Novel Framing

Frame from THEIR priorities:

Prioritization

Acknowledgment (when fatigue is moderate-to-high)

  1. Acknowledge the noise: "I know you've heard a lot about..."
  2. Differentiate: "What's different today..."
  3. Personalize: "For our organization specifically..."
  4. Prioritize: "Instead of covering everything..."

STEP 4: DELIVER

Timing

Frequency

Channel


The Final Insight: Why This Framework Works Across All Levels

The research on human psychology and behavioral science doesn't change based on job title.

Board members, executives, managers, and employees all:

What changes is the application:

But the underlying principles—concrete language, calibrated fear, differentiation, strategic delivery—apply universally.

Let me show you this in practice with one security initiative communicated to three different audiences:


Multi-Level Application: Same Initiative, Three Audiences

SCENARIO: Implementing MFA on remote access to customer database

TO BOARD OF DIRECTORS

"I know you receive quarterly security briefings covering numerous topics. Today I'm focusing on one finding from our Q4 audit.

Our audit identified three vulnerabilities in remote access systems. Two industry peers with identical vulnerabilities experienced breaches last quarter—combined losses of $8.3M.

I'm requesting $240K for three controls that close these vulnerabilities. Implementation: 90 days. Risk reduction: 75% fewer unauthorized access attempts."

Framework applied: Acknowledgment (high fatigue), concrete ($240K, 90 days, 75%), calibrated fear (~3%), personalized (OUR audit), prioritized (three controls)


TO MANAGEMENT TEAM

"Our Q4 audit found vulnerabilities in remote access to the customer database—35 employees access it with passwords only. Two competitors with this configuration were breached last quarter.

We're implementing Duo MFA for these 35 users. Cost: $80K. Timeline: 30 days. This also closes the repeated audit finding in our SOX documentation."

Framework applied: Concrete (35 employees, $80K, 30 days), calibrated fear (~2.5%), novel framing (addresses SOX finding), personalized (OUR audit, specific users)


TO EMPLOYEES

"Quick heads-up: Starting March 15, when you log into the customer database remotely, you'll use your phone to confirm it's you—takes 5 seconds.

Why: Our audit showed password-only access creates risk. This protects customer data and your account.

IT will send setup instructions March 10. Setup takes 2 minutes."

Framework applied: Concrete (March 15, 5 seconds, 2 minutes), very low EI (~1%), solution-focused, personalized (YOUR account)


Notice: Same underlying initiative. Same framework principles. Different application based on audience.

This is why the framework works whether you're emailing an intern or presenting to the board—the psychology is constant, the application adapts.


Your Implementation Plan

This Week:

Before your next communication (any level, any audience), walk through the 4-D Framework:

  1. Diagnose their fatigue level
  2. Design with concrete language and calibrated fear
  3. Differentiate with personalization and acknowledgment if needed
  4. Deliver with strategic timing

Compare your revised version to what you would have sent before. Notice the differences. Track the outcomes.

This Month:

This Quarter:


What's Next

Tomorrow's newsletter goes deeper with exclusive content:

This series gave you the research and the framework. The newsletter gives you the advanced implementation tools.

Breaking through InfoSec "Advice Fatigue" isn't a one-time fix

It's a systematic approach to communication that works at every level of your organization.


This is Part 5 of a 5-part series on science-backed approaches to breaking through InfoSec Advice Fatigue.

Subscribe to my newsletter for tomorrow's deep dive: case studies, measurement tools, templates, and the 30-day implementation roadmap.

This series taught you the framework. The newsletter shows you how to master it at every level.

Book a Call