darxai: engineering, AI, and cybersecurity darxai
Back to blog
AI-enabled phishing: why traditional training is no longer enough and what to do in an SMB

Cybersecurity 4 min read

AI-enabled phishing: why traditional training is no longer enough and what to do in an SMB

Analysis of AI-enabled phishing, vishing, and deepfakes in 2026 with a modern training plan for SMBs: realistic simulations, operational metrics, and verification processes.

In this article +

A recent KnowBe4 report indicates that 86% of phishing analyzed in the last quarter includes content generated or personalized with AI. Vishing and deepfakes, once anecdotal, are now part of the regular toolkit.

The classic awareness program, based on misspellings and suspicious links, increasingly fails to measure real risk. For an SMB, keeping that practice without updating it produces a false sense of security.

Short answer

Effective anti-phishing training in 2026 combines three changes: realistic simulations that match current attack quality, operational metrics beyond click rate, and verification processes that reduce damage when someone falls for it, because they will.

What changed in the last year

BeforeNow with AI
Misspellings and reused templatesIdiomatic, recipient-personalized text
Generic addresses and clumsy domainsCoherent impersonation with real environment accounts
Vishing reserved for VIP accountsVishing aimed at help desk and admin staff
Rare and expensive deepfakesAffordable short audio and video
Asynchronous email attacksMultichannel conversations with follow-up

The common factor: the cost of crafting a credible lure dropped, so volume and quality went up.

Attack types worth covering

VectorTypical caseWhere it hits
AI-generated email phishingEmail from “the CEO” in correct tone and contextFinance, hiring, HR
Vishing to the help deskCall to reset MFA or change phoneIdentity and SaaS
Voice deepfakeExecutive audio requesting urgent transferPayments and accounting
Vendor impersonationEmail changing IBAN after a legitimate prior threadProcurement and operations
MFA fatigue + social engineeringNotification spam combined with a callAny employee

An SMB does not need to cover every vector with the same intensity. It must cover those affecting processes with financial or identity impact.

Why traditional training fails

Common practiceWhy it loses effectiveness
Generic simulation templatesReal attacks are now personalized
”Click rate” as the only metricDoes not measure severity or attack progression
Annual training without reinforcementHabituation bias reduces attention
Punishing the individual who fellCreates silence in the next case
”Do not open anything suspicious” messageUnworkable in roles that open things all day

What gets measured gets managed. If the metric is only clicks, the program optimizes that number and ignores the rest.

Modern training program

ComponentGoalHow an SMB does it
Realistic simulationsMatch current attack qualityTemplates adapted to sector and role
Channel variationCover email, voice, and messagingOne quarterly simulation per channel
MicrolearningReinforce concepts without saturation3-5 minute pills at the moment of failure
Blame-free cultureIncrease report speedRecognition for reporting, not for guessing right
Verification processesReduce damage even when there is a clickDual channel for payments, IBAN changes, resets
Post-incident reviewLearn from each real caseBrief analysis shared with the team

The combination matters more than the tool. A realistic simulation without a verification process behind it only frightens.

Operational metrics

MetricWhat it indicatesHow to measure
Report rateHow fast someone alertsTime from sending to first report
Failure depthHow far the attack reachesClick only? Credentials? MFA approved?
Time to containmentProcess effectivenessMinutes until the account is locked
Per-person recurrenceIndividual reinforcement needConsecutive cycles with a miss
Process coverageCritical areas with verification% with documented dual channel

These metrics do not replace click rate, but they put it in context.

Processes that reduce damage

  1. Mandatory dual channel for payments above an agreed threshold.
  2. IBAN changes never by email; always with direct verbal verification.
  3. MFA reset with out-of-band verification and manager approval.
  4. Verbal confirmation of off-hours financial instructions.
  5. Explicit policy: when audio or video from an executive demands urgency, verify before acting.
  6. Clear channel to report suspicion without penalty.

These processes are cheap. The hard part is keeping them in daily life.

Common mistakes

  1. Replacing the entire program with an expensive platform without changing processes.
  2. Treating vishing as “out of scope” because it is not email.
  3. Punishing the first employee who reports and silencing the rest.
  4. Running seasonal simulations and forgetting them for months.
  5. Excluding help desk and admin staff from the program.
  6. Confusing training coverage with real compliance.

Progress indicators

IndicatorGoodBad
Simulation realismSector- and role-adaptedGeneric templates
Channel coverageEmail, voice, and messagingEmail only
Report timeMinutesDays or never
Payment processesDual channel in >90% of casesEmail is enough to authorize
Error cultureReports without penaltySilence after a miss

Final criterion

Defense against AI-enabled phishing stops being only a training problem and becomes a process problem. A person who falls can still cause little damage if the processes behind them require verification. That is the lever that moves risk most in an SMB.

Working sources

  • KnowBe4 research on the share of AI-enabled phishing in the last quarter.
  • Awareness best practices with operational metrics beyond click rate.
  • Official documentation of major identity providers for safe help desk processes.
  • Technical and training decisions must be adapted to each company’s sector, size, and maturity.

Next step

Apply cybersecurity and compliance to your company?

We assess, harden, and monitor systems, applications, and processes to reduce risk and support compliance with ENS, NIS2, DORA, and GDPR.