Phishing remains the single most common initial-access vector behind data breaches, ransomware, and business email compromise (BEC) — by orders of magnitude. In 2026, the threat has gotten harder, not easier: AI-generated emails are grammatically perfect, deepfake voice messages bypass call-back verification, and adversary-in-the-middle phishing kits defeat traditional MFA in real time. The good news: well-run phishing-awareness programs cut click-through rates from typical baselines of 25–35% down to 2–5% within 12 months. This guide is the practical 2026 framework for getting there.

What Phishing Looks Like in 2026
| Variant | What It Looks Like | Goal |
|---|---|---|
| Bulk phishing | Wide-net emails impersonating brands | Credential theft at scale |
| Spear phishing | Targeted, researched email to a specific person | Specific account compromise |
| Business Email Compromise (BEC) | Impersonation of CEO, CFO, vendor; rarely contains malware | Wire fraud, vendor banking changes, gift-card fraud |
| Smishing (SMS phishing) | Text messages with malicious links | Credential theft; MFA fatigue |
| Vishing (voice phishing) | Phone calls impersonating IT, banks, vendors | Credential theft; helpdesk social engineering |
| Deepfake voice / video | AI-generated audio of executives or colleagues | Wire fraud, urgent action requests |
| QR phishing (quishing) | QR codes in emails or printed materials | Bypass email URL filters |
| OAuth consent phishing | Fake “Sign in with Microsoft/Google” granting third-party app access | Persistent access to mailbox without password |
Red Flags Every Employee Should Know
- Urgency. “Act in 30 minutes or your account will be locked.”
- Authority pressure. “This is the CEO. I need this transferred today.”
- Unusual sender. Display name matches but email domain is slightly off.
- Unexpected attachment. Especially Office docs requesting macros or HTML attachments.
- Hover-link mismatch. Visible link text differs from actual URL.
- Out-of-band verification request. “Don’t tell anyone, I’ll explain later.”
- Banking change request. Always verify by phone to a known number.
- OAuth consent prompts. Unexpected “this app wants permission to…” dialogs from unfamiliar apps.
The Layered Defense Model

| Layer | Control | Catches |
|---|---|---|
| 1. Pre-delivery | SPF, DKIM, DMARC; email security gateway with sandboxing | ~95% of bulk phishing before it reaches inboxes |
| 2. Inbox | External-sender banner; impersonation detection; anti-spoofing | BEC and impersonation attempts |
| 3. User awareness | Training + phishing simulation | Targeted spear-phishing that gets through filters |
| 4. Click-time | URL rewrite + sandbox; safe browsing | Phishing pages opened from email or chat |
| 5. Authentication | Phishing-resistant MFA (FIDO2) | Adversary-in-the-middle attacks |
| 6. Post-click | EDR + conditional access + Identity Protection | Anomalous logins, token theft, lateral movement |
The Phishing Awareness Program — A 12-Month Cadence
| Cadence | Activity | Outcome Measured |
|---|---|---|
| Monthly | 1 phishing simulation per employee | Click rate trend, report rate |
| Quarterly | 10–15 minute targeted training module | Completion %; quiz scores |
| Annually | 30–45 minute comprehensive training | 100% completion; recorded for compliance |
| On-incident | Targeted retraining for repeat clickers | Click rate of repeat-clicker cohort |
| Continuous | “Phish report” button; positive recognition for reporters | Report rate |
Realistic Click-Rate Benchmarks
- No program (baseline): 25–35% click-through
- 3 months in: 12–18%
- 6 months in: 6–10%
- 12 months in: 2–5%; 30–50% report rate
- Mature (24+ months): 1–3%; 60–80% report rate
Repeat clickers cluster — typically 5–10% of employees account for 50%+ of clicks. Targeted retraining for that cohort drives outsized program improvement.
Tooling — What Actually Works in 2026

| Vendor | Strengths | Typical Cost (per user/year) |
|---|---|---|
| KnowBe4 | Largest catalog; integrated simulation; easy admin | $25–$45 |
| Hoxhunt | Adaptive simulation; positive-reinforcement model | $30–$50 |
| Arctic Wolf MAS | Bundled with MDR; managed program option | Bundled; varies |
| Microsoft Defender Attack Simulator | Included with Defender for Office 365 P2 | Bundled with M365 |
| Proofpoint Security Awareness | Tightly integrated with Proofpoint email security | $30–$50 |
Common Program Failure Modes
- Annual training only. One 45-minute video per year produces no behavior change.
- Punitive culture for clickers. Drives under-reporting; people hide mistakes instead of surfacing them.
- Simulations that are too easy. Generic “your package is delayed” emails do not match the modern threat landscape.
- Simulations that are unfair. Pretending to be a benefit program or charity creates trust erosion.
- No phish report button. Employees who suspect a real phish have no easy way to flag it.
- No follow-through on reported phish. Users stop reporting if they never hear back.
- Measuring only click rate. Report rate is the more important leading indicator.
Cyber Insurance and Compliance Alignment
- Cyber insurance: annual training + quarterly simulation, with completion %, click rate, and report rate trended
- HIPAA Security Rule: ongoing security awareness training (164.308(a)(5))
- SOC 2 CC1.4: employee security awareness with documented completion
- FTC Safeguards: employee training as part of the qualified individual’s program
- NIST 800-171 / CMMC: security awareness training at least annually (3.2.1, 3.2.2)
Frequently Asked Questions
How often should we run phishing simulations?
Monthly is the target. Less frequent than quarterly produces no measurable behavior change. More frequent than every 2 weeks creates fatigue.
Should we punish repeat clickers?
No. Punitive cultures drive under-reporting. Use targeted retraining and additional technical controls instead.
What about deepfake threats?
Out-of-band verification by call-back to a known number. AI-generated voice and video are now realistic enough that ear-recognition is no longer reliable.
Can MFA replace phishing training?
No. Phishing-resistant MFA defeats credential phishing, but BEC, gift-card fraud, malicious attachments, and OAuth consent phishing all bypass MFA. Layer them together.
Bottom Line
Phishing-awareness programs work — but only when run at the right cadence, with realistic simulations, a positive reporting culture, and targeted retraining for repeat clickers. A $25–$50 per user/year program reliably reduces click rate by 5–10x within a year, preventing most of the breaches cyber insurance is designed to cover.
Need help building or maturing your phishing-awareness program? ACS runs managed awareness programs for U.S.-based SMBs and mid-market firms. Contact us.



