CNiC Solutions

Cybersecurity threat hacker analyzing global data breach map on laptop in dark setting.


Phishing is the front door to nearly every major cyberattack. It is the #1 most-reported cybercrime in America, the leading initial access vector for ransomware, and the engine behind $2.77 billion in Business Email Compromise losses in a single year. Despite decades of awareness campaigns, one in three untrained employees will still click a simulated phishing link today. What has changed dramatically is the attack itself — AI-generated phishing emails now achieve click rates four times higher than traditional ones, deepfake voice calls have stolen $25 million in a single incident, and 82.6% of phishing emails now contain some form of AI-generated content. This article compiles the most current phishing statistics from Tier 1 primary sources — FBI IC3, Verizon DBIR, IBM, APWG, KnowBe4, Proofpoint, and CrowdStrike — to give organizations the full picture heading into 2026.

 

Key Takeaways: Phishing Statistics 2026

  • Phishing is America’s #1 reported cybercrime — 193,407 FBI IC3 complaints in 2024, more than double the next category (FBI IC3 2024 Annual Report).
  • 1 in 3 untrained employees will click a phishing link — the global average Phish-prone Percentage is 33.1%, with North America at 37.1% (KnowBe4 2025).
  • 82.6% of phishing emails now contain AI-generated content, and AI-crafted attacks achieve click rates 4.5x higher than traditional phishing (KnowBe4 / academic research).
  • Business Email Compromise generated $2.77 billion in U.S. losses in 2024 — the second-costliest cybercrime category, from just 21,442 complaints (FBI IC3 2024).
  • Vishing surged 442% from H1 to H2 2024, making voice phishing the fastest-growing attack vector (CrowdStrike 2025 Global Threat Report).
  • Security awareness training reduces phishing susceptibility by 86% within 12 months — dropping the click rate from 33.1% to 4.1% (KnowBe4 2025).
  • Phishing appears in 36% of all data breaches and is the initial access vector in 16% of confirmed breaches (Verizon DBIR 2025 / IBM 2025).

 

Phishing is everywhere one click can change everything infographic with phishing statistics
Phishing is everywhere one click can change everything infographic with phishing statistics

 



Phishing Attack Volume: The Scale of the Problem in 2025

To understand why phishing remains the dominant cybersecurity threat despite decades of defenses, start with the volume. The numbers are industrial in scale — and the filters that block most attacks don’t change the fact that attackers only need one to succeed.

3.4B
Phishing emails sent every single day globally
193,407
Phishing and spoofing complaints to the FBI IC3 in 2024 — the #1 most-reported cybercrime category (FBI IC3 2024 Annual Report)
4.8M
Unique phishing attacks recorded globally in 2024 by the Anti-Phishing Working Group (APWG)

Phishing/spoofing was the most reported type of crime to the FBI’s IC3 in 2024, with 193,407 complaints — more than double the second-place category (extortion at 86,415) and nearly triple personal data breaches (64,882). The financial impact of these phishing complaints jumped to $70 million in 2024, a 274% increase from $18.7 million in 2023, according to Proofpoint’s analysis of the IC3 data. That said, phishing’s greatest financial damage doesn’t show up in its own loss column — it shows up in what it enables downstream: Business Email Compromise ($2.77 billion), ransomware ($12 million+ in direct reported losses), and data breaches ($1.45 billion).

The APWG’s quarterly tracking data provides the broadest measurement of unique phishing attack campaigns. The group recorded 3.8 million unique phishing attacks in 2025 — slightly above the 3.76 million tracked in 2024 — with Q2 2025 peaking at over 1.13 million attacks in a single quarter. These numbers reflect only detected and reported incidents; the APWG estimates actual volume is two to three times higher than captured data.

Top FBI IC3 Cybercrime Categories by Complaint Volume (2024)

Phishing/Spoofing
193,407 complaints
Extortion
86,415
Personal Data Breach
64,882
Tech Support Fraud
~52,000
BEC
21,442

Google blocks approximately 100 million phishing emails daily. Microsoft screens roughly 5 billion emails per day across its platforms for threats. Despite those filters, phishing still causes an average of $4.88 million in breach costs per incident (IBM 2025) — because the attacker doesn’t need to defeat the filter most of the time. They need to get one email through to the right person, at the right moment.

Source: FBI IC3 2024 Annual Report | Proofpoint Analysis of 2024 IC3 Report

Explore CNiC’s Cybersecurity Services for Houston Businesses →



How Susceptible Are Employees? Phishing Click Rates by Industry

The reason phishing persists despite technological defenses is fundamentally human. Security systems can filter billions of emails, but the inbox that reaches a real employee is a direct line to organizational trust, credentials, and financial systems. The data on human susceptibility is sobering — and also hopeful, because it’s highly trainable.

33.1%
Global average Phish-prone Percentage — share of untrained employees who click phishing simulations (KnowBe4 2025 Phishing by Industry Benchmarking Report)
37.1%
North American baseline PPP — higher than the global average (KnowBe4 2025)
21 seconds
Median time for a user to click a phishing link after opening the email (Verizon DBIR)

KnowBe4’s 2025 Phishing by Industry Benchmarking Report — the largest dataset of its kind, measuring simulated phishing results across thousands of organizations — found that the global average Phish-prone Percentage (PPP) sits at 33.1%. That means roughly one in three untrained employees will interact with a phishing simulation before any security awareness training. In North America specifically, the baseline PPP is 37.1% — meaning over one in three American employees are at risk without training intervention.

Industry Baseline PPP (Untrained) PPP After 12 Months Training Improvement
Healthcare & Pharmaceuticals 41.9% (highest) ~4.2% 91% reduction
Insurance 39.2% ~3.9% ~90% reduction
Retail & Wholesale 36.5% ~4.0% ~89% reduction
Financial Services & Banking Elevated ~3.5% 91% reduction
Consulting & Manufacturing Elevated ~3.2% 92% reduction
Legal Elevated 3.1% (lowest post-training) 91% reduction
Global Average (all industries) 33.1% 4.1% 86% reduction

The time dimension of human susceptibility is equally alarming. Verizon’s DBIR data shows the median time between a phishing email being opened and the user clicking the malicious link is just 21 seconds. If the attack requires credential entry — a login page, for example — the entire compromise takes a median of 49 seconds from open to credential theft. Security teams have less than one minute to intercept the attack once it reaches an employee’s inbox.

The human element remains involved in approximately 60% of all breaches (Verizon DBIR 2025). This figure encompasses phishing, credential misuse, social engineering, and insider actions — confirming that technology alone cannot solve the phishing problem. The attack surface is human, and the most effective countermeasure is also human: trained employees who can recognize and report suspicious contact.

The “Bad Grammar” Myth Is Dead: The traditional heuristic — “look for poor grammar and spelling” — no longer works as a phishing detection strategy. KnowBe4’s 2025 report found 82.6% of phishing emails now contain AI-generated content, which produces native-level grammar, appropriate tone, and cultural context. University of Oxford research confirmed AI-generated phishing achieves a 54% click rate versus 12% for traditionally crafted emails. Training must focus on behavioral signals (urgency, unusual requests, unexpected sender context) rather than linguistic tells.

Source: KnowBe4 2025 Phishing by Industry Benchmarking Report | Verizon 2025 DBIR

See How CNiC’s Managed IT Includes Security Awareness Programs →



Business Email Compromise (BEC): Phishing’s Most Expensive Variant

Business Email Compromise deserves its own section because it is where phishing converts most reliably into catastrophic financial loss. BEC doesn’t require malware, exploits, or technical skill — it exploits organizational trust and payment workflows using impersonation, and it works with devastating consistency.

$2.77B
BEC losses reported to FBI IC3 in 2024 — the second-highest loss category of all cybercrime (FBI IC3 2024 Annual Report)
$17.1B
Total BEC losses reported to IC3 since 2015 — a 1,025% increase over the decade (FBI IC3 via Abnormal Security)
$8.5B
BEC losses reported via IC3 in just the three-year period 2022–2024 (Nacha / FBI IC3)

BEC was the 7th most-reported crime to the FBI IC3 by complaint count in 2024, with 21,442 complaints — but it ranked 2nd by total dollar loss at nearly $2.77 billion. The contrast is stark: phishing generated over 193,000 complaints for $70 million in direct losses, while BEC generated 21,000 complaints for $2.77 billion. On a per-complaint basis, the average BEC loss is approximately $129,000 — orders of magnitude higher than a typical phishing incident’s direct loss.

BEC accounts for 58% of all financially motivated phishing breaches (Verizon DBIR 2025) and was identified as a factor in 27% of all investigated incidents (Arctic Wolf 2025). The Association for Financial Professionals found that 63% of organizations experienced a BEC attempt in 2024. BEC volume surged 54% in the first half of 2025 compared to 2023 (Abnormal Security).

BEC Annual Losses Reported to FBI IC3

2015 (first tracked)
~$246M
2019
$1.77B
2022
$2.9B
2023
$2.9B
2024
$2.77B

Pretexting — where attackers construct a fabricated scenario to manipulate victims — now accounts for over 50% of all social engineering incidents (Verizon DBIR 2025), and it is the primary mechanism behind BEC. The most common scenarios include CEO impersonation requesting urgent wire transfers, vendor impersonation updating payment instructions, payroll diversion attacks, and real estate closing fraud. The FBI’s IC3 Recovery Asset Team achieved a 66% success rate in freezing fraudulent BEC transfers in 2024 — recovering hundreds of millions of dollars for victims who reported quickly.

Source: FBI IC3 2024 Annual Report | Nacha BEC Analysis, April 2025

Learn How AI-Enhanced Email Security Stops BEC Attacks →

 

Traditional Phishing vs AI-Powered Phishing comparison infographic with statistics and example phishing emails
Traditional Phishing vs AI-Powered Phishing comparison infographic with statistics and example phishing emails

 



AI-Powered Phishing, Vishing, and Smishing: The New Attack Landscape

The arrival of generative AI in the phishing toolkit marks a qualitative shift in the threat — not just a quantitative one. Phishing has always been a human problem; AI makes the human problem exponentially harder to solve by removing the linguistic signals that trained employees once used to identify attacks.

 

[IMAGE: Split-panel infographic contrasting “Traditional Phishing” vs “AI-Powered Phishing.” Left panel: generic email with obvious grammar errors, 12% click rate, hours to create. Right panel: hyper-personalized email with correct grammar and contextual details, 54% click rate, 5 minutes to create. Dark teal and charcoal palette with orange accent highlights for the AI panel. Professional data-journalism style. CNiC Solutions watermark bottom right.]

 

82.6%
of phishing emails analyzed between Sept 2024 and Feb 2025 contained AI-generated content (KnowBe4 2025 Phishing Threat Trends Report)
54% vs. 12%
Click rate for AI-generated phishing vs. traditional phishing — a 4.5x difference (academic research cited by multiple security vendors)
442%
Surge in vishing (voice phishing) attacks from H1 to H2 2024 (CrowdStrike 2025 Global Threat Report)

AI-Generated Email Phishing. IBM researchers demonstrated in 2024 that an AI system could construct a complete, convincing phishing campaign in 5 minutes using just 5 prompts — a task that took human security experts 16 hours. KnowBe4’s data shows that in 2024, at least one AI-polymorphic feature was present in 76.4% of all phishing attacks, making them more resistant to blocklists, secure email gateways, and native security tools. Between September 2024 and February 2025, phishing emails increased 17.3% compared to the prior six-month period, with 57.9% sent from compromised legitimate accounts — making sender-reputation-based filters ineffective.

Vishing (Voice Phishing). Vishing surged 442% from H1 to H2 2024 — the fastest growth of any phishing vector tracked by CrowdStrike. AI voice cloning can replicate a person’s voice from as little as 3 seconds of audio (McAfee 2024). The most high-profile documented case: a finance employee at engineering firm Arup transferred $25 million to fraudsters after attending a deepfake video conference call impersonating the company’s CFO and senior leadership — every face and voice was AI-generated. Callback phishing — emails directing victims to call an attacker-controlled phone number instead of clicking a link — grew 500% in Q4 2025 (VIPRE Security Group), bypassing email URL scanning entirely.

Smishing (SMS Phishing). SMS-based phishing accounts for 35% of all phishing attacks (SentinelOne 2026) and surged 40% year-over-year (Keepnet 2025). Nineteen percent of all breaches now originate from smishing or vishing combined (Verizon DBIR 2025). 83% of phishing websites are specifically designed to target mobile devices (Zimperium 2024), reflecting the shift to mobile-first attack strategies. SMS lacks the equivalent of enterprise email security gateways, and personal mobile devices typically have weaker security controls than corporate endpoints.

QR Code Phishing (“Quishing”). QR code attacks increased 400% between 2023 and 2025 (Abnormal Security). Quishing is particularly effective because the malicious URL is encoded in an image, bypassing text-based URL scanning in most email security tools. The most affected sectors are energy, healthcare, and manufacturing. Attackers distribute QR codes via email, physical flyers, and even fake parking meters and public signage.

Phishing Vector Key Statistic Trend Source
Email phishing 3.4 billion emails/day Stable volume, rising sophistication Industry consensus
AI-generated email 82.6% of phishing emails Rapidly increasing KnowBe4 2025
Vishing (voice) +442% H1→H2 2024 Fastest-growing vector CrowdStrike 2025
Smishing (SMS) 35% of all phishing; +40% YoY Increasing SentinelOne / Keepnet 2025
QR code (quishing) +400% between 2023–2025 Sharply increasing Abnormal Security
AiTM (MFA bypass) +146% in 2024 Increasing Security vendor telemetry
Callback phishing +500% in Q4 2025 Sharply increasing VIPRE Security Group

Source: KnowBe4 2025 Phishing Threat Trends Report | CrowdStrike 2025 Global Threat Report

Protect Your Network from Phishing-Enabled Intrusions →



The Financial Impact of Phishing: Cost Per Breach and Total Losses

Phishing is not just the most common attack type — it is among the most expensive. The financial damage flows through multiple channels: direct fraud losses, breach remediation costs, regulatory penalties, and the downstream costs of the ransomware or data theft that phishing enables.

$4.88M
Average cost of a phishing-caused data breach in 2024 (IBM Cost of a Data Breach 2025)
254 days
Average detection and containment time for a phishing-initiated breach (IBM 2025)
$16.6B
Total FBI-reported cybercrime losses in 2024, a record +33% from 2023 — phishing is the primary enabler (FBI IC3 2024)

IBM’s 2025 Cost of a Data Breach Report found that phishing-caused breaches average $4.88 million per incident, with a detection and containment timeline of 254 days — nearly nine months during which attackers maintain access. Every additional day of undetected attacker access adds cost: IBM’s data shows a $1.2 million cost difference between breaches identified before versus after the 200-day mark, making early detection one of the highest-ROI investments a security team can make.

The total 2024 FBI IC3 losses of $16.6 billion — a 33% increase over 2023 and the highest ever recorded — are predominantly enabled by phishing and social engineering as the initial attack vector. The breakdown of major loss categories in 2024:

Crime Category 2024 IC3 Losses Phishing Role
Investment Fraud $6.57 billion Often initiated via phishing/social engineering
Business Email Compromise $2.77 billion Direct phishing variant
Tech Support Fraud $1.46 billion Social engineering dependent
Personal Data Breach $1.45 billion Frequently phishing-initiated
Ransomware (direct reported) $12M+ (severely undercounted) Phishing is initial vector in 54% of cases
Phishing/Spoofing (direct) $70 million N/A (direct category)

The $70 million in direct phishing losses understates phishing’s true financial impact by orders of magnitude. When you account for BEC, tech support fraud, data breaches, and ransomware that originate with a phishing email, phishing’s total loss enablement in 2024 exceeds $4.3 billion conservatively — making it the highest-ROI initial attack investment in the criminal toolkit.

Source: FBI IC3 2024 Annual Report | IBM Cost of a Data Breach 2025

Calculate Your Organization’s Potential Breach Cost →



Phishing by Industry: Most Targeted Sectors in 2025

Phishing is universal in delivery but selective in targeting. Attackers prioritize industries where stolen credentials have the highest value, where time pressure creates decision errors, and where the workforce is least trained. The APWG’s sector targeting data and KnowBe4’s susceptibility benchmarks together show which industries face the greatest exposure.

Industries Most Targeted by Phishing (APWG 2024–2025)

Financial Services
23.5% of attacks
SaaS / Webmail
19.4% of attacks
E-Commerce
14.2% of attacks
Social Media
12.8% of attacks
Logistics / Shipping
8.1% of attacks

Financial Services (23.5% of all phishing attacks). Banks, insurance companies, and fintech platforms are the single most targeted industry. Banking login pages remain phishing’s #1 impersonation target. Financial services organizations face a 65% ransomware attack rate (Sophos 2024) in addition to high phishing volume. Despite high attack exposure, financial services organizations typically have more mature security programs, and KnowBe4’s data shows they achieve strong post-training PPP reductions of 91%.

SaaS and Webmail (19.4%). Microsoft 365 and Google Workspace are primary targets because stolen credentials grant access to entire organizational ecosystems — email, files, calendars, cloud applications, and password reset pathways. A single compromised Microsoft 365 account provides an attacker with the credibility of a legitimate internal sender, making downstream BEC and lateral movement significantly easier. In 2024, phishing emails bypassing Microsoft’s native security and secure email gateways increased 47%.

Healthcare (Highest Susceptibility Rate). Healthcare and pharmaceuticals has the highest employee Phish-prone Percentage of any industry at 41.9% — meaning nearly 4 in 10 healthcare workers would click a simulated phishing link without training. The combination of high attack volume, high susceptibility, and high breach costs ($7.42 million average per IBM 2025) makes healthcare the most financially exposed sector to phishing.

Source: KnowBe4 2025 Phishing by Industry Benchmarking Report | APWG Phishing Activity Trends Report 2024–2025

Find Industry-Specific Cybersecurity Solutions from CNiC →



Phishing Defense: What Works, What Doesn’t, and the Training ROI

If susceptibility is the problem, training is the most proven solution. KnowBe4’s 2025 benchmark data provides the clearest empirical evidence yet that security awareness training works — rapidly, consistently, and across all industries and organization sizes.

86%
Reduction in phishing susceptibility after 12 months of security awareness training — from 33.1% to 4.1% globally (KnowBe4 2025)
40%
Reduction in click rates within just the first three months of training (KnowBe4 2025)
4.1%
Post-training global average PPP — down from 33.1% baseline, achieved after 12 months of ongoing simulated phishing and awareness training (KnowBe4 2025)

The training ROI case is compelling at every scale. North American organizations start with a 37.1% baseline PPP. After 12 months of training, that drops to approximately 4.1% — an 89% reduction. Applied to IBM’s $4.88 million average phishing breach cost, an organization that reduces its susceptibility from 37% to 4% has dramatically reduced the probability of an incident that costs nearly $5 million. The training investment — typically measured in tens of thousands of dollars annually for mid-market organizations — represents extraordinary ROI against that exposure.

Beyond training, several technical controls have proven effective:

Multi-factor authentication (MFA) remains the single highest-impact technical control against credential phishing. However, adversary-in-the-middle (AiTM) attacks — which surged 146% in 2024 — can bypass standard MFA by proxying authentication sessions and stealing session cookies in real time. Phishing-resistant MFA (hardware keys, passkeys) is the next-generation requirement.

Email security layering. URLs were used four times more often than malicious attachments in 2025 email attacks (Proofpoint) — a reversal from historical patterns, driven by improved endpoint security blocking malicious files. Modern email security needs to inspect links dynamically at click time, not just at delivery. In 2024, phishing emails bypassing Microsoft’s native security increased 47%.

Reporting culture. Verizon’s DBIR data shows 20% of employees who receive a phishing simulation report it as suspicious — but of those who clicked first, 11% still reported afterward. Building a culture where employees report suspicious contacts without fear enables security teams to identify active campaigns before they cause widespread damage.

Defense Layer Effectiveness Key Limitation
Security Awareness Training 86% reduction in click rates (12 months) Requires ongoing reinforcement; one-time training decays
Standard MFA Blocks most credential theft Bypassed by AiTM attacks (+146% in 2024)
Phishing-Resistant MFA Blocks AiTM attacks Deployment complexity; hardware cost
Email Security Gateway Filters majority of bulk phishing 47% increase in bypass rate in 2024; AI phishing evades signature detection
DNS/URL Filtering Blocks known malicious domains Attackers use legitimate cloud platforms (Google, Dropbox, SharePoint)
Incident Reporting Culture Early campaign detection Requires psychological safety and clear reporting process

Source: KnowBe4 2025 Phishing Benchmarking Analysis

Get a Phishing Risk Assessment from CNiC’s vCIO Team →



Phishing Statistics Summary (2026 Reference Table)

Statistic Data Point Source Year
Daily phishing emails sent globally 3.4 billion Industry consensus 2024–2025
FBI IC3 phishing complaints 193,407 (#1 most-reported crime) FBI IC3 2024 Annual Report 2024
Unique phishing attacks (APWG) 4.8 million (2024); 3.8M (2025) APWG 2024–2025
Direct phishing losses (IC3) $70 million (+274% from 2023) FBI IC3 2024 / Proofpoint 2024
BEC losses (IC3) $2.77 billion FBI IC3 2024 Annual Report 2024
BEC losses (10-year total) $17.1 billion since 2015 (+1,025%) FBI IC3 via Abnormal Security 2015–2024
Average phishing breach cost $4.88 million IBM Cost of a Data Breach 2025 2025
Average BEC breach cost $4.67 million IBM 2025 2025
Phishing detection time (average) 254 days IBM 2025 2025
Time to click (median) 21 seconds after opening Verizon DBIR 2025
Time to credential entry (median) 49 seconds total Verizon DBIR 2025
Phishing in all data breaches 36% Verizon DBIR 2025 2025
Phishing as initial breach vector 16% of breaches IBM 2025 2025
Human element in breaches 60% Verizon DBIR 2025 2025
Global average PPP (untrained) 33.1% KnowBe4 2025 Benchmark Report 2025
North American baseline PPP 37.1% KnowBe4 2025 Benchmark Report 2025
Highest-risk industry (PPP) Healthcare & Pharma: 41.9% KnowBe4 2025 Benchmark Report 2025
PPP reduction after 12-month training 86% reduction; 33.1% → 4.1% KnowBe4 2025 Benchmark Report 2025
AI content in phishing emails 82.6% KnowBe4 2025 Phishing Threat Trends 2024–2025
AI phishing click rate 54% vs 12% (traditional) Academic research 2024
Vishing growth rate +442% (H1 to H2 2024) CrowdStrike 2025 2024
Smishing share of all phishing 35%; +40% YoY SentinelOne 2026 / Keepnet 2025 2025
QR phishing growth +400% between 2023–2025 Abnormal Security 2025
AiTM phishing growth +146% in 2024 Security vendor telemetry 2024
Financial services: phishing share 23.5% of all attacks APWG 2024–2025 2024–2025
SaaS/webmail: phishing share 19.4% of attacks APWG 2024–2025 2024–2025
Largest single vishing incident $25 million deepfake CFO call (Arup) CrowdStrike / Brightside 2024
BEC share of financially motivated breaches 58% Verizon DBIR 2025 2025



Frequently Asked Questions: Phishing Statistics

How common are phishing attacks in 2025?
Phishing is the single most reported cybercrime in the United States. The FBI IC3 received 193,407 phishing and spoofing complaints in 2024 — more than double the next highest category. APWG recorded 4.8 million unique phishing attacks globally in 2024. Approximately 3.4 billion phishing emails are sent every day, and Google alone blocks around 100 million phishing emails daily. Despite these filters, phishing appears in 36% of all confirmed data breaches (Verizon DBIR 2025), because attackers only need one to get through to the right person.
What percentage of employees click on phishing emails?
According to KnowBe4’s 2025 Phishing by Industry Benchmarking Report, the global average Phish-prone Percentage (PPP) — the share of untrained employees who would click a simulated phishing link — is 33.1%. North American employees have a baseline PPP of 37.1%. Healthcare and pharmaceuticals is the highest-risk sector at 41.9%. The median time for a user to click a phishing link is just 21 seconds after opening the email (Verizon DBIR), and credential entry takes a median of 49 seconds total — giving security teams less than a minute to intervene.
How much does a phishing attack cost a business?
IBM’s 2025 Cost of a Data Breach Report found the average cost of a phishing-caused breach is $4.88 million, with a detection and containment window averaging 254 days. Business Email Compromise — the most financially damaging phishing variant — generated $2.77 billion in FBI-reported losses in 2024. Over the past decade, BEC losses reported to IC3 have totaled $17.1 billion, a 1,025% increase since 2015. Direct phishing losses significantly understate total impact because phishing enables larger downstream losses through ransomware, data breaches, and fraud.
How is AI changing phishing attacks?
AI has fundamentally changed the phishing threat. KnowBe4’s 2025 Phishing Threat Trends Report found 82.6% of phishing emails now contain AI-generated content. AI-generated phishing emails achieve a 54% click-through rate compared to 12% for traditional human-written versions. IBM demonstrated in 2024 that AI can construct a complete phishing campaign in 5 minutes — a task that took human security experts 16 hours. Vishing (voice phishing via AI-cloned voices) surged 442% from H1 to H2 2024. The “bad grammar” heuristic for identifying phishing is now obsolete.
Does security awareness training actually reduce phishing risk?
Yes, dramatically. KnowBe4’s 2025 benchmark data shows that security awareness training reduces the global Phish-prone Percentage by 40% within just three months, and by 86% after 12 months of ongoing training. The post-training global average PPP falls to 4.1% from a baseline of 33.1%. Healthcare and pharmaceuticals — the highest-risk sector at 41.9% — achieved a 91% improvement rate after 12 months. North America’s 37.1% baseline makes training particularly high-ROI for U.S. organizations facing the highest regional susceptibility rates.



Methodology & Sources

All statistics in this article are sourced directly from Tier 1 primary sources: government agencies, peer-reviewed researchers, and organizations that collect raw incident or simulation data. No blog-to-blog citations were used as primary references. Where CNiC-derived calculations appear (labeled clearly in the article), the formula and contributing sources are stated explicitly.

Primary Sources Referenced:

  • FBI Internet Crime Complaint Center (IC3) 2024 Annual Report — U.S. government self-reported cybercrime complaint and loss data. ic3.gov
  • Verizon 2025 Data Breach Investigations Report (DBIR) — Annual analysis of confirmed breach incidents globally, including phishing involvement and human element data.
  • IBM Cost of a Data Breach Report 2025 — Quantitative research on breach costs, detection timelines, and phishing-specific cost analysis. ibm.com
  • KnowBe4 2025 Phishing by Industry Benchmarking Report — Phish-prone Percentage data across industries and organization sizes, measuring simulated phishing simulation results. knowbe4.com
  • KnowBe4 2025 Phishing Threat Trends Report — Analysis of real-world phishing email characteristics, AI content prevalence, and payload trends. knowbe4.com
  • Anti-Phishing Working Group (APWG) Phishing Activity Trends Reports 2024–2025 — Industry-standard tracking of unique phishing attack campaigns and sector targeting.
  • CrowdStrike 2025 Global Threat Report — Threat intelligence including vishing growth data and adversary behavior trends.
  • Proofpoint State of the Phish 2025 — Email threat telemetry and URL-vs-attachment trend data.
  • Abnormal Security Research — BEC volume trends and QR code phishing growth data.
  • McAfee Voice Cloning Research 2024 — Technical capability benchmarks for AI voice cloning.

This article was researched and published by CNiC Solutions, a Houston-based managed IT and cybersecurity provider. Content is updated as new primary source data becomes available. Last updated: May 2026.

 

author avatar
David McFarlane Founder & CEO
As Founder and CEO of CNiC Solutions, David McFarlane has spent more than 15 years guiding Houston-area organizations through complex IT and cybersecurity challenges. His hands-on leadership ensures technology decisions align with business goals, risk management, and operational efficiency.
back to blog