FindArticles FindArticles
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
FindArticlesFindArticles
Font ResizerAa
Search
  • News
  • Technology
  • Business
  • Entertainment
  • Science & Health
  • Knowledge Base
Follow US
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
FindArticles © 2025. All Rights Reserved.
FindArticles > News > Technology

Why Phishing Training Fails Employees And Security

Bill Thompson
Last updated: October 25, 2025 7:30 am
By Bill Thompson
Technology
7 Min Read
SHARE

Phishing awareness courses string the prospect of safer inboxes, but the newest proof proves they achieve little to that success. A massive field study performed by UC San Diego Health and Censys researchers exposed that standard cybersecurity education had virtually no substantial effect on workers’ click-through on malicious messages.

Even simulated phishing with inserted lessons scarcely renovated the needle, slicing disappointment by perhaps two percentage points at best. This level of victory is incredibly disappointing given the convenience of phishing results in ransomware and account takeover, underlined by many of the available industry information, like the SpyCloud Identity Threat Report and the Verizon Data Breach Investigations Report.

Table of Contents
  • The Evidence Under The Microscope In A Large Study
  • Why Traditional Training Teaches So Little
  • The Real Fix? Build Defenses Around Humans
  • Smarter Schooling Without The Security Theater
  • How To Measure What Matters In Real-World Security
An infographic titled What's the state of cybersecurity for Asia & the Pacific? by Verizon Business, showing statistics about breaches and social engineering attacks with a line graph.

The Evidence Under The Microscope In A Large Study

The researchers assessed results across ten phishing movements administered to over 19,500 staff of a large healthcare company. One variable that failed to forecast performance: mandated yearly training. Instead, the draw more than the bait mattered: when only a few clicked on the generic “update your Outlook password” ticket, over a third fell for the “vacation bill plan update” cliché.

Over time, susceptibility improved: responses rose over the drive, beginning from low double digits and rising above half in later moves. In other words, employees didn’t get more knowledgeable; attackers got more persuasive. The final verdict was straightforward: the standard preparedness tactics provide minimal real-world guarantee against well-made phish.

Why Traditional Training Teaches So Little

Slide decks and click-through quizzes once a year are the wrong tool for a fast, emotionally manipulative threat. Phishing succeeds by diverting attention under the guise of urgency, authority and rewards. In that moment, people don’t consult a memory of rules; they act based on habit and context. Without perpetual, situational reinforcement, that knowledge dims and reflexes rule.

Simulated phish can also backfire. If the questions are too easy, staff learn nothing. If they’re too tricky, they’ll learn to mistrust internal email and hate security. If you do this, public shaming of the clickers discourages reporting — people conceal their mistakes instead of raising a hand promptly, and what incident responders need is precisely the opposite.

Companies often measure the wrong things. “Click rates” on staged emails are a vanity stat — they don’t mirror how attackers operate: including multi-channel lures, QR codes, OAuth consent abuse, and voice or chat-based social engineering. Meanwhile, email banners and generic warnings lead to alert fatigue — and users tune out exactly the cues you wanted them to see.

The Real Fix? Build Defenses Around Humans

The way forward is not more lectures; it’s resilient design, both locally and globally. Make the safe and healthy action the easy action; make the risky, unhealthy action hard to do. Security agencies including CISA and standards organizations like NIST support “phishing-resistant” authentication. That means device-based cryptographic login systems such as FIDO2 passkeys, not one-time codes that attackers can relay. And where there are passwords, apply number-matching and conditional privileges tied to device health and location on the way in.

The image shows the cover slide for  Top 12 Takeaways from Verizon DBIR 2 023 Data Breach Investigations Report with the SOCRadar logo. On the right, a bar chart illustrates a steady increase in data breaches from 2 005 to 202 0, with a significant spike around 202 0. Filename : verizon dbir2 023 reportcover. png

Enhance the email stack to block more threats before delivery and actions remaining on click:

  • Enforce SPF, DKIM, and DMARC with alignment.
  • Roll out MTA-STS and use modern TLS.
  • Sandbox and detonate risky links.
  • Isolate browsers for high-risk users.
  • Disable legacy protocols that supersede modern controls.
  • Limit OAuth app consent and keep an eye on token issuing, a popular vehicle for silent persistence.

Redesign high-risk business workflows. Vendor bank account updates or payroll/gift card procurement requests should be prompted for out-of-band validation and dual approval. Macros and links from outside the department must be blocked by default. Restrict standing authorizations and provide temporary credentials when necessary. These restrictions help dissipate the force of those inevitable clicks.

Smarter Schooling Without The Security Theater

Education matters just as much — but it needs to be behavioral education, not performative. Quick, in-context nudges when at risk within email and collaboration tools. Sub out once-a-year marathons for minutes-long microlearning relevant to a user’s role and duties. Praise quick reporting over perfect detection; the security team can sift through noise, but they can’t examine what never comes to their attention.

Conduct tabletop exercises for executives and help desks — the very groups attackers hope to socially engineer. Train your staff on how to authenticate requests via a trusted mechanism, not to try and memorize hundreds of possible red flags. Gamify safely: challenges are opt-in and encouraged as ways to help people out, not adversarial.

How To Measure What Matters In Real-World Security

Shift metrics from “Who clicked?” to “How fast were we detecting, containing and recovering?” Track the right indicators and outcomes:

  • Median time to report suspicious messages.
  • Pre-delivery block rates.
  • Percentage of attempted credential thefts that fail.
  • How often risky changes (such as bank account updates) are interrupted by verification steps.
  • Reductions in OAuth token abuse, unauthorized wire transfers, and account takeovers after control adjustments.

Real-world breaches underline the lesson. Famous intrusions at major brands have often begun with an authentic-seeming message and an accommodating help desk or a distracted employee. Training didn’t let those people down; the system failed to predict human moments. Harden the system, and humans are not your Achilles’ heel but your best early-warning sensor.

The answer is plain as day: traditional phishing training by itself is a pipe dream. Couple pragmatic, phishing-resistant technology with thoughtful and just-in-time education and better processes. It’s how you turn less clicking into fewer compromises — and security theater into security.

Bill Thompson
ByBill Thompson
Bill Thompson is a veteran technology columnist and digital culture analyst with decades of experience reporting on the intersection of media, society, and the internet. His commentary has been featured across major publications and global broadcasters. Known for exploring the social impact of digital transformation, Bill writes with a focus on ethics, innovation, and the future of information.
Latest News
Google fixes AOD for timer and stopwatch controls on Pixel Watch
Xbox Game Pass Meta Quest 3S Bundle Deal Revealed
SpaceX In Talks For $800B Secondary Sale Valuation
Samsung Cuts Prices on Odyssey Gaming Monitors
Google Play Settlement Payments Arrive This Spring
Rosetta Stone Deal: Unlock 25 Languages
Startup Debuts Brain Wearable to Fight Chronic Stress
Meta Snaps Up AI Wearables Startup Limitless
T-Mobile Collaborates With Baby Three For Exclusive Limited Plushies
Feds Are Probing Waymo Robotaxis Over School Buses
Poetry Can Jailbreak Your AI Models, Study Finds
Netflix to Acquire Warner Bros. and HBO, Including Max
FindArticles
  • Contact Us
  • About Us
  • Write For Us
  • Privacy Policy
  • Terms of Service
  • Corrections Policy
  • Diversity & Inclusion Statement
  • Diversity in Our Team
  • Editorial Guidelines
  • Feedback & Editorial Contact Policy
FindArticles © 2025. All Rights Reserved.