Talk With an Expert

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success

Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success (PDF, 0.72MB)Published: 07 Jan, 2025
Created by:
Cory Keller

Identification of phishing emails can be cumbersome, accomplished by rule-based filters, machine learning, user-submitted, and other automated analyses. User submission is the cheapest and easiest to implement but a much more time-intensive process, adding overhead to already burdened staff.