{"id":91993,"date":"2020-10-05T09:00:05","date_gmt":"2020-10-05T16:00:05","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91993"},"modified":"2025-06-25T07:06:47","modified_gmt":"2025-06-25T14:06:47","slug":"why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/","title":{"rendered":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world can prevent 100 percent of phishing attacks from hitting user inboxes. At that point in time, your employees become your defenders. They must be trained to recognize and report phishing attacks. But not all training is equally proficient.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">This blog examines the current state of security awareness training, including how you can create an intelligent solution to detect, analyze, and remediate phishing risk. You\u2019ll also learn about an upcoming event to help you get data-driven insights to compare your current phishing risk level against your peers.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>A new reality for cybersecurity<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The Chief Information Security Officer (CISO) at a modern enterprise must contend with a myriad of threats. The hybrid mix of legacy on-premises systems and cloud solutions, along with the proliferation of employee devices and shadows, means your security team needs a new and comprehensive view of phishing risk across the organization. Self-reported training completion metrics don\u2019t provide insights into behavior changes or risk reduction, leading CISOs to distrust these metrics. Improvement in employee behavior becomes difficult to measure, leaving them anxious that employee behavior has improved at all.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Many information workers view security awareness training as a tedious interruption that detracts from productivity. Often when an employee is compromised during a simulated attack, they find the ensuing training to be punitive and navigate away from the training like nothing happened. Worse, simulations are often out-of-context and don\u2019t make sense for the employee\u2019s industry or function.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>People-centric protection<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Making secure behaviors a part of people\u2019s daily habits requires a regular program of targeted education combined with realistic simulations. That means regular breach and attack simulations against endpoints, networks, and cloud security controls. Microsoft Defender for Office 365 now features simulations to help you detect and remediate phishing risks across your organization. Attack Simulation Training in Microsoft Defender for Office 365, delivered in partnership with Terranova Security, helps you gain visibility over organizational risk, the baseline against predicted compromise rates, and prioritize remediations. To learn more about this capability, <a href=\"https:\/\/aka.ms\/ASTLaunchIgnite\" target=\"_blank\" rel=\"noopener noreferrer\">watch the product launch at Microsoft Ignite 2020<\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Terranova Security employs a pedagogical approach to cybersecurity, including gamification and interactive sessions designed to engage users\u2019 interest. The simulations are localized for employees around the world and follow the highest web content accessibility guidelines (WCAG) 2.1. You will be able to measure employee behavior changes and deploy an integrated, automated security awareness program built on three pillars of protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><strong>Simulate real threats:<\/strong> Detect vulnerabilities by using real lures (actual phishing emails) and templates, training employees on the most up-to-date threats. Administrators can automate and customize simulations, including payload attachment, user targeting, scheduling, and cleanup. Azure Active Directory (AAD) groups automate user importing, and the vast library of training content enables personalized training based on a user\u2019s vulnerability score or simulation performance.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Remediate intelligently: <\/strong>Quantify your social engineering risk across employees and threat vectors to accurately target remedial training. Measure the behavioral impact and track your organization\u2019s progress against a baseline compromise rate. Set up automated repeat offender simulations with the user susceptibility metric and add context by correlating behavior with a susceptibility score.<\/li>\n\n\n\n<li class=\"wp-block-list-item\"><strong>Improve your security posture: <\/strong>Reinforce your human security system with hyper-targeted training designed to change employee Attack Simulation Training in Microsoft Defender for Office 365 provides nano learnings and micro learnings\u201d to cater to diverse learning styles to reinforce awareness.<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Check your threat level<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Coinciding with National Cyber Security Awareness Month (NCSAM), &nbsp;Terranova will release the results at the end of October from their the <a href=\"https:\/\/terranovasecurity.com\/gone-phishing-tournament-2020\/\" target=\"_blank\" rel=\"noopener noreferrer\">Terranova Security Gone Phishing Tournament\u2122<\/a>. This popular event helps security leaders get an up-to-the-minute picture of their organization\u2019s phishing click rate. Terranova launched this campaign back in August and supplied a free phishing simulation for its applicants and enabled them to benchmark themselves against their peers, giving them accurate click-rate data for comparison.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Co-sponsored by Microsoft, the Terranova Security Gone Phishing Tournament uses an email template from Attack simulation training\u2014a new capability of Office 365 ATP releasing later this year\u2014that acts as an intelligent social engineering risk management tool using context-aware simulations and targeted training.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>.&nbsp; Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is still one of the most significant risk vectors facing enterprises today. Innovative email security technology like Microsoft Defender for Office 365 stops a majority of phishing attacks before they hit user inboxes, but no technology in the world can prevent 100 percent of phishing attacks from hitting user inboxes.<\/p>\n","protected":false},"author":96,"featured_media":91994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3753,3795],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3695],"topic":[3671],"coauthors":[1916],"class_list":["post-91993","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-cybersecurity-policy","tag-phishing","content-type-news","product-microsoft-defender","product-microsoft-defender-for-office-365","topic-email-security","review-flag-1-1694638265-354","review-flag-2-1694638266-864","review-flag-new-1694638263-340","review-flag-partn-1694638263-597","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-05T16:00:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T14:06:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Microsoft Security Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Microsoft Security Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/\",\"@type\":\"Person\",\"@name\":\"Microsoft Security Team\"}],\"headline\":\"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security\",\"datePublished\":\"2020-10-05T16:00:05+00:00\",\"dateModified\":\"2025-06-25T14:06:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\"},\"wordCount\":765,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg\",\"keywords\":[\"Cybersecurity policy\",\"Phishing\"],\"articleSection\":[\"Cybersecurity\",\"Microsoft Defender Advanced Threat Protection\",\"Office 365 Security\",\"Phishing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\",\"name\":\"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg\",\"datePublished\":\"2020-10-05T16:00:05+00:00\",\"dateModified\":\"2025-06-25T14:06:47+00:00\",\"description\":\"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg\",\"width\":11648,\"height\":8736,\"caption\":\"an over the shoulder image of a woman sitting in front of a computer with a blurred silhouette of a person walking past.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d\",\"name\":\"Teri Seals-Dormer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g\",\"caption\":\"Teri Seals-Dormer\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog","description":"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/","og_locale":"en_US","og_type":"article","og_title":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog","og_description":"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/","og_site_name":"Microsoft Security Blog","article_published_time":"2020-10-05T16:00:05+00:00","article_modified_time":"2025-06-25T14:06:47+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg","width":1024,"height":768,"type":"image\/jpeg"}],"author":"Microsoft Security Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Microsoft Security Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/microsoft-secure-blog-staff\/","@type":"Person","@name":"Microsoft Security Team"}],"headline":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security","datePublished":"2020-10-05T16:00:05+00:00","dateModified":"2025-06-25T14:06:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/"},"wordCount":765,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg","keywords":["Cybersecurity policy","Phishing"],"articleSection":["Cybersecurity","Microsoft Defender Advanced Threat Protection","Office 365 Security","Phishing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/","name":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg","datePublished":"2020-10-05T16:00:05+00:00","dateModified":"2025-06-25T14:06:47+00:00","description":"Learn how integrated training helps detect, assess, and remediate phishing risk across your organization.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2020\/10\/WIN21_HOL_Acer_Swift_1_2148.jpeg","width":11648,"height":8736,"caption":"an over the shoulder image of a woman sitting in front of a computer with a blurred silhouette of a person walking past."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/10\/05\/why-integrated-phishing-attack-training-is-reshaping-cybersecurity-microsoft-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Why integrated phishing-attack training is reshaping cybersecurity\u2014Microsoft Security"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/112e0d6f7a2c99efae36a4a1b2403c2d","name":"Teri Seals-Dormer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g03d4afda56ae931a7066d88415e8df14","url":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c94dbb0d416ec556cf564fa18bc9ac227ba2ce7b653774bdcc4c631f793fd674?s=96&d=microsoft&r=g","caption":"Teri Seals-Dormer"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/v-teseal\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=91993"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91993\/revisions"}],"predecessor-version":[{"id":140343,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/91993\/revisions\/140343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/91994"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=91993"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=91993"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=91993"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=91993"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=91993"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=91993"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=91993"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=91993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}