Hook
What if your newest hire just wired fifty grand to a spoofed CEO? This usually happens because your email filters caught the malware but missed the believable ask. BEC doesn't need a payload. It needs someone who trusts the wrong message at the wrong time.
Email security stacks rely on perimeter defenses like Secure Email Gateways, authentication protocols like SPF, DKIM, and DMARC, and post-delivery threat detection. Each layer addresses a different attack vector. None of them stop an employee from clicking a link in a perfectly formatted invoice from a lookalike domain.
That gap is where human risk management enters the picture.
Why This Matters Now
Phishing tactics are evolving faster than technical controls can adapt. Verizon's 2025 Data Breach Investigations Report found that synthetic text in malicious emails has doubled in two years. AI-generated phishing no longer looks suspicious by default. Grammar errors and formatting inconsistencies that once flagged threats are disappearing.
BEC attacks bypass authentication checks by registering domains one character off from legitimate ones. A lookalike domain passes SPF and DMARC validation because it's technically authentic. The technical infrastructure sees nothing wrong. The employee sees an urgent request from someone who appears to have authority.
Alert fatigue compounds the problem. Security teams receive hundreds of reported emails daily. Without automated triage, analysts spend hours determining which threats are real while malicious emails sit in inboxes. By the time a genuine threat is confirmed, damage has already occurred.
The strategic challenge is no longer just blocking threats at the perimeter. It's reducing the likelihood that employees will act on threats that reach them.
Three Strategic Gaps Exposed
Filters Block Malware but Let Through Spear Phishing
Traditional email filters excel at identifying known malware signatures and bulk spam campaigns. They struggle with targeted spear phishing that mimics legitimate business communication. A well-crafted spear phishing email contains no malicious payload, no suspicious links, and no technical indicators that would trigger a block.
- Attackers research targets using LinkedIn and company websites to craft contextually accurate messages
- Emails reference real projects, colleagues, and workflows to establish credibility
- Requests appear routine until the financial or credential theft component is executed
- Technical controls have no basis for rejection because the email structure is legitimate
BEC Emails Pass DMARC and SPF Checks Using Lookalike Domains
Domain-based authentication protocols validate that an email originates from an authorized server. They do not validate whether the domain itself is legitimate. Attackers register domains that visually resemble your organization or partners, then send emails that pass all authentication checks.
- A single character substitution or added hyphen creates a valid domain that clears technical validation
- Employees scanning emails quickly do not notice minor domain discrepancies
- Executive impersonation becomes trivial when the spoofed domain matches the executive's name format
- DMARC, SPF, and DKIM provide no defense against domains that are technically authentic but strategically malicious
Help Desks Can't Triage Reported Phish Fast Enough
User reporting is essential for catching threats that bypass automated defenses. Without automation, reported emails create a backlog that overwhelms security teams. Analysts manually review each submission, classify threats, and remediate across mailboxes. This process takes hours per incident.
- Real threats remain active in employee inboxes while analysts work through the queue
- Employees stop reporting when they perceive no timely response to their submissions
- Security teams lose visibility into emerging attack patterns buried in unprocessed reports
- Manual triage scales poorly as organizations grow and phishing volume increases
The Strategic Shift Required
Email security must address both technical threats and human decision-making under uncertainty. Perimeter defenses and authentication protocols remain necessary but insufficient. Organizations need visibility into which users are most likely to act on phishing attempts and mechanisms to reduce that likelihood before real threats arrive.
This requires integrating security awareness training with technical defenses. Training must simulate the tactics attackers actually use, measure user responses, and adapt content based on evolving threats. Technical layers should provide contextual warnings that help users assess risk without generating alert fatigue.
The shift is from assuming technical controls will catch everything to building a culture where employees function as an adaptive defense layer. This means measuring your organization's Phish-prone Percentage, running realistic phishing simulations, and training users on the specific tactics that bypass your filters.
- Identify which users click simulated phishing links and prioritize their training
- Deploy AI-driven email protection that flags suspicious emails with contextual banners
- Automate phishing incident response to reduce triage time and improve user reporting adoption
How Security Awareness Training Addresses This
KnowBe4 Security Awareness Training combines phishing simulations, targeted training content, and automated incident response to reduce human-driven email risks. The platform measures your organization's baseline Phish-prone Percentage, then tracks improvement as users complete training and encounter simulations.
- Filters Block Malware but Let Through Spear Phishing: Phishing simulations expose users to realistic spear phishing tactics, training them to recognize contextually accurate but malicious requests before real threats arrive.
- BEC Emails Pass DMARC and SPF Checks Using Lookalike Domains: Training content teaches users to verify sender domains manually and recognize executive impersonation attempts that technical controls cannot block.
- Help Desks Can't Triage Reported Phish Fast Enough: PhishER automates phishing incident response by categorizing reported emails, identifying patterns, and remediating threats across mailboxes without manual analyst intervention.
KnowBe4 Defend adds AI-driven email protection that detects inbound phishing attempts and displays contextual warning banners. This provides real-time risk assessment without blocking legitimate emails or generating excessive alerts.
Who This Is For
- Security Awareness Managers measuring and reducing Phish-prone Percentage across user populations
- InfoSec Managers integrating human risk management with technical email defenses
- IT Security Admins managing phishing incident response and user reporting workflows
- Compliance Officers ensuring security awareness training aligns with regulatory requirements
Call to Action
See how KnowBe4 Security Awareness Training reduces your Phish-prone Percentage and automates phishing incident response. Visit https://content.optrics.com/knowbe4-hrm-plus
FAQ
What is Phish-prone Percentage?
Phish-prone Percentage measures the proportion of users who click simulated phishing links during testing. It provides a baseline for human risk and tracks improvement as users complete training.
How does KnowBe4 Defend differ from traditional email filters?
KnowBe4 Defend uses AI to detect phishing attempts that bypass Secure Email Gateways and authentication protocols. It displays contextual warning banners on suspicious emails instead of blocking them outright, allowing users to make informed decisions.
Can security awareness training replace technical email defenses?
No. Security awareness training complements technical defenses by addressing threats that filters cannot block. Effective email security requires both layers working together.
How does PhishER reduce alert fatigue?
PhishER automates phishing incident response by categorizing reported emails, identifying patterns, and remediating threats across mailboxes. This reduces manual triage time and allows analysts to focus on genuine threats.

