Despite historic investment in cyber defenses, phishing remains the leading cause of breaches in 2025, consistently outmaneuvering technical controls with creativity, speed, and AI-driven sophistication. Attackers are more prolific and effective today than ever: organizations reported a 17% increase in phishing attempts and a 47% rise in attacks that evade Microsoft and secure email gateways just this year.
AI is supercharging phishing attacks, enabling threat actors to generate highly personalized, convincing messages at scale—82% of phishing emails now leverage AI-generated content. The result? Even well-trained employees and seasoned IT pros are fooled by increasingly subtle and believable scams.
Compounding the problem, attackers impersonate the brands and platforms organizations trust the most—Microsoft, DocuSign, HR platforms, using social engineering lures themed around expiring credentials, urgent document reviews, or “critical” payroll updates.
The latest industry benchmarking shows that a third of employees (33.1%) are susceptible to clicking on phishing or social engineering emails in a baseline test. Some verticals fare far worse: healthcare, insurance, and retail lead with susceptibility rates above 36–41%. Just 90 days of focused security awareness training drops organizational risk by over 40%, and a year later by up to 86%—from roughly 1 in 3 failures to as low as 4 in 100.
Even with advanced threat controls, some malicious messages slip through. Modern phishing detection relies on user vigilance and fast reporting. Here’s how to spot the red flags:
Adaptive phishing simulations and behavior-based training can reduce incidents by 86% in less than a year, transforming employees from the weakest link to the organization’s strongest defense. Reporting rates soar in engaged cultures, speeding threat detection and response: in companies using advanced, personalized security awareness programs, real phishing incidents per 1,000 employees have dropped from 466 to under 75 annually.
Speed matters. There is a $1.2 million cost differential between phishing breaches contained in 200 days or less versus slower detection. Organizations with well-trained users not only avoid breaches, but they also respond faster and contain incidents before business is severely impacted.