惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

GbyAI
GbyAI
Threat Intelligence Blog | Flashpoint
Threat Intelligence Blog | Flashpoint
P
Proofpoint News Feed
L
Lohrmann on Cybersecurity
S
Secure Thoughts
Attack and Defense Labs
Attack and Defense Labs
人人都是产品经理
人人都是产品经理
Stack Overflow Blog
Stack Overflow Blog
W
WeLiveSecurity
O
OpenAI News
SecWiki News
SecWiki News
博客园 - Franky
NISL@THU
NISL@THU
Microsoft Azure Blog
Microsoft Azure Blog
T
Tor Project blog
Microsoft Security Blog
Microsoft Security Blog
aimingoo的专栏
aimingoo的专栏
Security Latest
Security Latest
H
Hacker News: Front Page
Google Online Security Blog
Google Online Security Blog
P
Privacy & Cybersecurity Law Blog
Cyber Security Advisories - MS-ISAC
Cyber Security Advisories - MS-ISAC
D
Darknet – Hacking Tools, Hacker News & Cyber Security
月光博客
月光博客
李成银的技术随笔
Spread Privacy
Spread Privacy
F
Full Disclosure
F
Fortinet All Blogs
T
The Exploit Database - CXSecurity.com
Vercel News
Vercel News
AWS News Blog
AWS News Blog
WordPress大学
WordPress大学
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
IntelliJ IDEA : IntelliJ IDEA – the Leading IDE for Professional Development in Java and Kotlin | The JetBrains Blog
V
Visual Studio Blog
J
Java Code Geeks
博客园 - 三生石上(FineUI控件)
G
Google Developers Blog
云风的 BLOG
云风的 BLOG
博客园 - 司徒正美
Engineering at Meta
Engineering at Meta
Last Week in AI
Last Week in AI
P
Palo Alto Networks Blog
宝玉的分享
宝玉的分享
T
True Tiger Recordings
N
News and Events Feed by Topic
酷 壳 – CoolShell
酷 壳 – CoolShell
Cisco Talos Blog
Cisco Talos Blog
N
News | PayPal Newsroom
S
SegmentFault 最新的问题
Jina AI
Jina AI

Human Risk Management Blog

Report: Romance Scams Cost UK Victims £102 Million Last Year Warning: Phishing Attacks Are Abusing the Kuse AI App CyberheistNews Vol 16 #20 [Heads Up] Today You Have Only 60 Seconds to Stop That Breach. Are You Ready? Phishing Campaign Exploits Google AppSheets to Target Facebook Accounts FTC: Americans Lost $2.1 Billion to Social Media Scams Last Year What Is an Al Agent in Cybersecurity? Why Integrate Threat Intelligence Feeds into Email Security? Traffic-Themed SMS Phishing Targets Users Around the World Redesigning Security Culture for the Agentic Age Fighting AI-Assisted Ransomware Threats Phishing Attacks Begin Targeting the 2026 FIFA World Cup Warning: Netflix Phishing Scams Can Lead to Serious Consequences Navigating the Cybersecurity Landscape in India Empowering Human and AI Agents The Rise of Cyber Threats and AI in the Philippines: A New Era Beyond Legacy Security Report: 4 in 10 UK Businesses Were Breached by Phishing Last Year Navigating Human and Agentic Risks for Financial Institutions in the APJ Region CyberheistNews Vol 16 #19 Crafty Criminals Continue to Pose as Help Desks in Social Engineering Attacks From Cyberwar to Cognitive Warfare: The Geopolitical Impact on Cybersecurity in Africa You Have 60 Seconds to Stop the Breach. Are You Ready? World Password Day 2026: Treat Identity as the Perimeter (and Act Like It) Attackers Continue to Pose as Help Desks in Social Engineering Attacks Introducing the New AI-Native KnowBe4 SAT Report: Deepfake Fraud Causes Billions in Losses Your KnowBe4 Fresh Content Updates from April 2026 Alert: Payroll-Hijacking Attacks Are Targeting Canadian Employees How to Design Security for Agentic AI Why Your Email Security Needs a Global Human Network to Close the Detection Gap Phishing Attacks Target Executives via Microsoft Teams CyberheistNews Vol 16 #17 [Heads Up] This Sophisticated Scam Should Be a Warning to All Companies FBI: Americans Lost More Than $20 billion to Fraud Last Year Phishing Campaigns Abuse AI Workflow Automation Platforms Nobody runs a marathon by accident This Sophisticated Scam Should Be a Warning To All Companies CyberheistNews Vol 16 #16 How Identity at the Edge Highlights the New Frontiers of Trust Alert: WhatsApp Phishing Campaign Delivers Malware Alert: WhatsApp Phishing Campaign Delivers Malware Survey: Security Leaders Emphasize Need for Workforce Education Identity at the Edge: How the Sixth Annual Identity Management Day Highlights the New Frontiers of Trust Early Results From KnowBe4’s AI Agents Show Easier Administration and Lower Cyber Risk CyberheistNews Vol 16 #15 Anthropic's Mythos Is Not Just a Tool. It's Something You Have to Contain. New KnowBe4 Agent Risk Manager Addresses Pervasive AI Agent Risk Anthropic's Mythos Preview: Why the Human Layer Matters More, Not Less New Phishing Kit Streamlines ClickFix Attacks Phishing Campaign Targets Japanese Firms During Tax Season Rising Compliance Oversight Pressure: From Audit Fatigue to Continuous Readiness AI Phishing Attack Prevention Strategies: How AI Identifies and Limits Human Risk Phishing Campaign Impersonates Palo Alto Networks Recruiters Voice Phishing is a Growing Social Engineering Threat AI-Powered Human Risk Management Shifts the Focus to Adaptive, Behavior-Based Training CyberheistNews Vol 16 #14 [Heads Up] Clever Hackers Use Custom Fonts to Bypass AI Defenses Campaign Mode: Because Your SOC Team Has a Life Your KnowBe4 Fresh Compliance Plus Content Updates | March 2026 Detection and Prevention of Misdirected Emails: What to Know
Reducing Phish-Prone Rates Without Training Fatigue: A Practical Playbook for Traditional Organizations
Dr. Kawin Bo · 2026-05-21 · via Human Risk Management Blog

Phishing remains the single biggest human-driven threat in most organizations. Yet many security leaders face a familiar problem: the stronger the push to run frequent training and simulations, the louder the employee backlash. Complaints range from “too many tests” to “training interrupts my work,” and that resistance can erode both engagement and security outcomes. The good news: you can lower Phish-prone Percentages without burning out your people by shifting strategy from frequency for frequency’s sake to smarter, less intrusive, and more supportive interventions that change behavior.

Below is a concise, actionable playbook designed for leaders in traditional organizations who must balance risk reduction, employee experience, and operational realities.

Why the usual approach fails:

  • Overtraining breeds avoidance - Repeated, high-frequency simulations that feel punitive drive defensive behavior: employees learn how to “pass” the test rather than internalize safer habits, and some will deliberately click or otherwise game the system just to stop the exercise. Studies of security training show training that triggers resentment reduces long-term retention and reporting rates, undermining program goals.
  • One-size-fits-all content misses real risks - Generic phishing templates and broad-stroke e-learning fail because they aren’t mapped to the organization’s real workflows; people need contextual examples tied to the apps, vendors, and communications they handle daily. Risk-aligned, role-specific content improves relevance and engagement, producing better transfer of learning to real-world decisions (case study in a large healthcare organization).
  • Training that interrupts work lowers perceived value - When learning demands compete with billable hours or pressing deadlines, employees deprioritize it. Short, asynchronous microlearning and minimally intrusive simulations integrate more cleanly with workflows and are perceived as enabling rather than obstructing productivity.
  • Metrics-focused programs ignore root causes - Click rate is a useful signal but not a causal explanation. Without follow-up diagnostics like reporting behavior, contextual surveys, or UX reviews, programs misattribute causes and may apply counterproductive remedies. Broader behavioral metrics reveal why clicks happen and where to focus remediation.

The following is a human-centered framework that works (four pillars):

four-pillars-of-a-modern-simulation-program

The following are recommended tactics to reduce backlash:

  • Ask for less, give more: Short, focused lessons fit into daily workflows and respect time pressures, increasing completion and retention while minimizing resentment.
  • Make simulations meaningful: Believability sustains credibility; unrealistic or repeatedly obvious phishes encourage dismissiveness. Spacing reduces habituation and preserves the salience of each simulation.
  • Foster a no-blame culture: A blame-free approach encourages reporting and learning; positive reinforcement for reporting behavior builds a culture of collective defense and reduces concealment of mistakes.
  • Use incentives carefully: Reward structures that publicly shame low performers damage trust and increase gaming. Public recognition or non-monetary rewards for reporting and helpful behavior are more effective and less corrosive.

For leadership, pivot the messaging to the following for the staff to enforce and incentivize them and transform the culture:

  • “We are testing to understand where our controls need to be stronger — not to catch people out.”
    • This framing shifts the focus from individual blame to system improvement, aligning staff with the program’s protective intent and reducing defensiveness.
  • “If you click, report immediately — it helps everyone.”
    • Clear, action-oriented calls to report emphasize the communal benefits of prompt escalation and create a straightforward behavioral norm.
  • “Our goal is to make your work safer with as little disruption as possible.”
    • Positioning the program as an enabler of safe productivity reassures employees that measures are designed to support their work, not hinder it.

Conclusion

Reducing Phish-prone Percentages in traditional organizations doesn’t require relentless testing; it requires smarter testing, timely coaching, technical backstops, and leadership that frames training as enabling rather than policing. Adopt a targeted, human-centered approach and you’ll lower risk while preserving trust and productivity.