Beyond Detection: Using Real Phishing Data to Gauge Security Training Program Success
Identification of phishing emails can be cumbersome, accomplished by rule-based filters, machine learning, user-submitted, and other automated analyses. User submission is the cheapest and easiest to implement but a much more time-intensive process, adding overhead to already burdened staff.