Technical security controls stop a lot of attacks. Firewalls, endpoint protection, MFA, network segmentation—these are essential. But the most sophisticated technical defenses can be undone in seconds by one employee who clicks a phishing link, gives their password to a convincing caller, or holds the door open for someone who isn’t supposed to be in the back of house. In 2026, the human layer is where most attacks succeed.

Cannabis is a particularly challenging environment for building security awareness. High turnover, part-time staff, regulatory complexity, cash pressure, and the culture of the industry all create friction against traditional corporate security training. A 45-minute compliance video developed for bank employees isn’t going to stick with your budtenders.

This playbook is built for cannabis. It’s specific, practical, and designed for operations where the security training budget is limited and the staff are not security professionals.


Why Cannabis Has a Security Training Problem

Before getting into the program itself, it’s worth understanding why security training is harder in cannabis than in most industries—so you can design around those constraints rather than ignoring them.

Turnover Is Relentless

The cannabis industry average annual turnover rate exceeds 40%, with some markets seeing budtender turnover above 70% annually. This means your security training program isn’t something you do once a year—it needs to be continuously running, with onboarding components that reach new employees before they interact with sensitive systems.

An employee who hasn’t received security training is most dangerous in their first 90 days, when they don’t yet know what normal looks like, are eager to please and less likely to question suspicious requests, and are most vulnerable to social engineering that exploits uncertainty about processes.

The Compliance Mindset vs. The Security Mindset

Cannabis operators and their staff are deeply trained in regulatory compliance: METRC reporting, state license requirements, product testing documentation, age verification. Compliance means following rules established by external authorities.

Security training tries to instill a different mindset: skepticism, verification, “this seems wrong.” These cultures can conflict. Employees accustomed to “the state says do this, so you do this” can be more vulnerable to social engineering attacks that impersonate regulatory authority—because their instinct is compliance, not skepticism.

Effective cannabis security training explicitly addresses this tension.

Cash Culture and the Implied Trust Environment

Cannabis retail requires trust between staff members—the team handles significant cash, valuable inventory, and sensitive customer data together. This creates a culture of collegial trust that social engineers exploit. “I’m the new IT vendor, I just need your login for a second” is more likely to work in an environment where everyone’s used to trusting teammates.


The Core Training Curriculum: What Every Employee Needs to Know

This curriculum is structured in three tiers based on role. Not every employee needs everything—but every employee needs the fundamentals.

Tier 1: All Staff (Required at Onboarding, Refreshed Quarterly)

Module 1: What Attackers Want From Your Dispensary

Employees who understand why attackers target dispensaries are better at recognizing attacks. Cover:

  • Customer data (names, purchase history, ID information) has street value
  • METRC credentials allow attackers to manipulate compliance records
  • POS system access allows theft without physical presence
  • Banking credentials enable ACH fraud
  • Ransomware attackers want your systems down so you pay to restore them

The takeaway: you are sitting next to valuable targets every shift, and your login credentials are the keys to those targets.

Module 2: Recognizing Phishing—The 2026 Version

Old phishing recognition training focused on bad grammar, generic greetings, and obvious red flags. Modern AI-generated phishing often has none of those. Update your training to focus on:

  • The pretext over the presentation: Even a perfectly written, correctly formatted email can be malicious. Focus on what it’s asking you to do, not how it looks.
  • Urgency and authority combined: Legitimate regulatory agencies and vendors almost never demand immediate action via email with a link. “Your METRC account will be suspended in 24 hours if you don’t click this link” is a red flag regardless of how official it looks.
  • Hover before you click: Show employees how to hover over links to see the actual destination URL before clicking. A link that displays as “metrc.com” but goes to “metrrc.com” is an attack.
  • Attachment rules: Never open email attachments from unexpected senders, regardless of how convincing the explanation is.

Use real examples when you can—screenshots of cannabis-specific phishing attempts (with identifying information removed) are dramatically more effective than generic examples.

Module 3: Password and Account Security

This needs to be simpler than most corporate training makes it:

  • One password, one account: Reusing the same password across multiple accounts means one breach unlocks everything.
  • How to use a password manager: Actually demonstrate this. Don’t just tell employees to use one.
  • Never share credentials: Not with co-workers, not with IT support callers, not with vendor representatives. Legitimate IT staff never need your password.
  • MFA is not optional: Any account that offers MFA should have it enabled. Show employees how to set it up on the systems they use.

Module 4: The “If You See Something” Reflex

The most valuable security behavior you can instill is reporting suspicious activity without fear of consequences. Make it explicit: reporting a suspicious email or interaction, even if it turns out to be nothing, is always the right call. Cover:

  • How to report suspicious emails (dedicated address, Slack channel, whatever your system is)
  • What to do if you accidentally clicked a link or entered credentials somewhere suspicious (report immediately—quick action limits damage)
  • Physical security: who to tell if someone is in an area they shouldn’t be, if a door is propped, if you see unfamiliar equipment attached to systems

Time commitment: 45-60 minutes at onboarding, 15-minute refresher quarterly. Build this into your onboarding checklist alongside state compliance training.


Tier 2: Managers and Lead Staff (Additional Training)

Managers are higher-value targets because they have more access—administrative accounts, higher authority to approve transactions, ability to override POS controls, access to employee and financial data.

Module 5: Business Email Compromise (BEC) Recognition

BEC attacks disproportionately target managers because they’re the ones who have authority to wire money, change bank accounts, or approve unusual transactions. Train managers specifically on:

  • Never change payment information via email alone: Any request to update a vendor bank account or approve an unusual wire transfer requires a phone verification call to a known-good number (not a number in the email).
  • CEO/executive impersonation: Attackers compromise or spoof executive email accounts to pressure managers into authorizing payments. Establish a firm verbal confirmation requirement for any financial transfer over a threshold.
  • How to verify regulatory communications: Show managers the actual process for verifying communications from METRC support, state cannabis regulators, and the DEA. Provide the official contact numbers and establish the rule that all regulatory requests go through verified channels.

Module 6: Vendor Access Management

Managers often handle granting third-party vendor access to systems. Train on:

  • Never grant access to systems based on an email or call alone—verify through established vendor contacts
  • All vendor access should be logged, time-limited, and reviewed periodically
  • How to revoke vendor access when a vendor relationship ends

Module 7: Recognizing Insider Threat Indicators

Cannabis operations are vulnerable to insider threats as well as external attackers. Managers should understand warning signs without becoming paranoid:

  • Unusual access to systems outside normal work hours
  • Attempting to access systems or data outside normal role scope
  • Disabling security cameras or logging systems
  • Significant personal financial stress combined with increased system access
  • Unusual interest in customer data or financial processes outside their role

Tier 3: IT Staff and System Administrators (Technical Training)

If you have dedicated IT staff or rely on a managed service provider, they need role-specific training beyond the general curriculum.

Module 8: Cannabis-Specific Attack Vectors

Your IT staff should be familiar with:

  • METRC and seed-to-sale tracking system security configuration (separation from general network, credential management, API key security)
  • POS system hardening (network isolation, patch management, vendor access controls)
  • Cannabis-specific threat intelligence sources and communities

Module 9: Incident Recognition and Response

  • How to recognize early indicators of compromise (unusual outbound traffic, unauthorized account access, unexpected software installation)
  • Who to call and what to do when an incident is suspected
  • Evidence preservation during an incident (don’t reboot systems that may contain forensic evidence)
  • How to invoke the METRC downtime procedure while systems are being investigated

Delivery Methods That Actually Work in Cannabis Retail

Traditional annual training video approaches have measurable problems: completion rates are poor, retention rates are worse, and behavior doesn’t change. Cannabis operations need delivery methods suited to the actual work environment.

Microlearning at the Start of Shift

A 5-minute security topic at the start of a staff meeting or shift briefing, delivered consistently, produces better retention than a long annual training. Build a library of 5-minute modules covering one specific topic each—phishing red flags, password rules, social engineering scenarios—and rotate through them.

This approach also works around the turnover problem: every shift briefing is a training opportunity for whoever is in the room.

Phishing Simulation Programs

Running simulated phishing tests on your employees—with immediate education for those who click—is consistently the most effective behavior modification tool in security training. Modern platforms (KnowBe4, Proofpoint Security Awareness, Cofense) provide ready-made templates; some now offer cannabis-specific phishing scenarios.

Key principles for running simulations effectively:

  • Never punish employees for clicking—the goal is learning, not gotcha
  • Immediate post-click education: the moment they click, they should see an explanation of what they just encountered and what to look for next time
  • Increase sophistication gradually: start with obvious phishing and work toward AI-personalized tests as your workforce gets better
  • Track and celebrate improvement: show your team that the click rate is going down over time

The Security Scenario Discussion

Once a quarter, bring your team together for a 20-minute discussion of a realistic security scenario:

“An official-looking email arrives from what appears to be the Colorado MED saying there’s a METRC discrepancy on three transactions and you need to log in to their audit portal to review and correct it. The link in the email goes to colorado-med-audit.net. What do you do?”

Let the team work through it. What are the red flags? What’s the right process? Who do you call? This builds intuitive recognition skills that “watch out for phishing” training doesn’t.


Building a Security-Aware Culture Without Making Everyone Paranoid

The goal is not a workplace where employees are afraid to click anything or where every vendor interaction is treated as a potential attack. That doesn’t work—it creates friction that makes people route around security controls entirely.

The goal is a workplace where:

  • Questioning a suspicious request is normal and rewarded, not embarrassing
  • Employees know specifically what to do when something seems off
  • Security isn’t an IT problem, it’s everyone’s baseline responsibility
  • Near-misses (someone almost clicked something, someone almost shared credentials) are reported and learned from rather than hidden

Specific cultural practices that support this:

Thank people for reporting: When an employee reports a suspicious email, thank them publicly (in the team channel or at the next shift meeting). Even if it turned out to be legitimate, the behavior was correct.

Share (anonymized) near-misses: When a phishing simulation catches someone, discuss the scenario with the whole team (anonymously). “We ran a simulation last week and a few people clicked—here’s what the email looked like and here’s how to spot it.” Shared learning without shame.

Make security part of onboarding alongside compliance: When new staff complete your state compliance training, they also complete security training. Same importance, same time investment.

Be transparent about incidents: If your dispensary experiences a security incident (or a near-miss), tell your staff what happened and what changed as a result. Staff who understand the stakes take security more seriously than staff who are just told to follow rules they don’t understand.


The Regulatory Argument for Security Training

If you’re a dispensary owner looking at the cost of building this program and wondering if it’s worth it, consider the regulatory angle:

Several states are moving toward explicit security training requirements for cannabis licensees. Colorado, California, and Illinois have each updated or proposed updating their security regulations to include requirements for documented employee security awareness training. If your state doesn’t require it yet, it likely will.

More immediately: in the event of a data breach, your state regulator and potentially federal authorities will review whether you had reasonable safeguards in place, including staff training. “We didn’t train our employees on security” is not a defense—it’s evidence of negligence.

The businesses that build training programs now, before they’re required, are also building the documentation trail that demonstrates reasonable care. That trail matters when regulators are deciding whether a breach results in a warning or a license suspension.


Where to Start If You’re Starting From Zero

If you currently have no formal security training program, here’s the 30-day path to a functional baseline:

Week 1: Create a simple one-page “Security Rules” document covering: don’t share passwords, verify before clicking, report suspicious anything. Distribute and have every employee sign it. Not because a signature equals security—because the conversation around signing it is training.

Week 2: Set up a free or low-cost phishing simulation. KnowBe4 and Proofpoint both offer trial access. Run your first simulated phishing campaign.

Week 3: Hold your first security scenario discussion at a team meeting. Use the METRC audit scenario above or adapt it to your state’s regulatory body.

Week 4: Add security training to your onboarding checklist. Even if it’s just the one-page rules document and a 20-minute walkthrough of what to do if something seems wrong—document it and do it for every new hire.

That’s a minimum baseline, not a complete program. But it’s dramatically better than nothing, and it’s achievable in a month without a large budget.

The difference between the cannabis operations that survive security incidents and the ones that don’t isn’t usually technology. It’s whether the people inside the building know what to do when an attacker comes for them—because the attacker is always coming.


CannaSecure develops cannabis-specific security awareness training programs and phishing simulation campaigns for dispensaries and MSOs. Contact us to discuss building a program for your operation.