For Small Business

Small Business Phishing Training: Why 56% of SMB Employees Still Click (and What to Do About It)

Published April 18, 2026 · 12 min read · By the ScamDrill Team
Editorial cover graphic with the headline ‘56% of SMB employees still can’t spot a phishing email’ alongside a sketched fake invoice email annotated with the red flags scammers exploit: a spoofed domain, artificial urgency, and an unknown sender.

Let’s start with a number that should terrify every small business owner who’s been deferring their security program for “next quarter.”

88% Share of all ransomware breaches in 2025 that hit small and mid-sized businesses. Average cost per breach: $120,000. 60% of SMBs attacked close within six months.
Source: Total Assure Cyber Attack Statistics, 2025

Here’s the companion stat that explains it: fewer than 25% of small businesses conduct regular cybersecurity training for their employees. And in untrained workforces, 56% of employees can’t spot a phishing email (source: Dojo Phishing Statistics Report, 2025).

If you run a small business — an accounting firm, a dental practice, a construction company, a SaaS startup — and you have never run a phishing simulation with your team, you are statistically significantly likelier to experience a breach this year than to not. That’s not hyperbole. It’s what the numbers say.

This article is a practical guide to running an effective phishing training program at a small business, with a focus on organizations that don’t have a dedicated security team or a CISO.

Why small businesses are the most-attacked group

There’s a common misconception that attackers go after big companies for the big payouts. The data has said the opposite for years, and increasingly so:

The FBI’s 2025 IC3 report documented $3 billion in business email compromise losses, much of it at companies under 100 employees. The KnowBe4 2025 Phishing by Industry Benchmark Report found that SMBs in industries like construction, consulting, healthcare (small practices), and financial services had baseline phishing click rates in the 30–40% range — meaning one in three employees at an untrained small business clicks the bait.

Why annual “click-through-these-slides” training doesn’t work

If you already do security training at your company, there’s a decent chance it’s a once-a-year compliance module: a 30-minute video, some multiple-choice questions, and a certificate that gets filed for an auditor. This is the format most SMBs have, and it is largely worthless.

A 2025 study from UC San Diego examined 10 phishing simulations across 19,500 healthcare employees. They found no correlation between recency of annual training and phishing-failure rates. A 2025 University of Chicago paper (“Understanding the Efficacy of Phishing Training in Practice”) corroborated this, finding annual training drove a 9.5% improvement — but contextual, interactive training delivered at the moment of a simulated-click failure drove a 19% improvement. More recent research suggests the best-run programs achieve 40% reduction in 90 days and 86% within a year.

The lesson is clear: training is only effective if it (a) happens more than once a year and (b) includes simulated attacks with immediate feedback. Anything else is theatre.

“Annual compliance training has roughly zero effect on real-world click rates. Only ongoing simulations with in-the-moment feedback actually move the needle.”

The minimum viable phishing training program for a 5–50 person business

Here’s what we recommend for the typical small business owner or operations manager who has been assigned “fix our security awareness” on top of 47 other responsibilities:

Component 1: Monthly phishing simulations

This is the non-negotiable piece. Every employee gets 1–2 simulated phishing emails per month. They should cover the realistic mix of attacks your business actually sees:

When someone clicks, they land on a friendly teaching page that shows them the exact red flags. When they correctly report the email (using a reporting button in their email client), they get a small acknowledgement.

Component 2: Quarterly short-form training (10 minutes max)

Long training modules don’t work, but very short ones reinforcing specific behaviors do. Rotate topics:

Keep each session under 10 minutes. Short beats comprehensive, every time. Compliance-era 45-minute modules just teach employees that security training is tedious.

Component 3: “Report phish” button + clear incident response

Every employee email client should have a one-click “Report Phish” button. When they click it, the email goes to a central mailbox (or your MSP), the email is removed from everyone’s inbox, and the reporter gets a quick acknowledgement.

The critical behavior you’re trying to build is: when in doubt, report, don’t click. Make reporting the easier, faster option than dealing with a suspicious email alone.

Component 4: Blameless post-incident learning

The moment someone in your company actually falls for a real phishing email, you have a choice: shame them, or turn it into a team learning event. Choose the latter, always. The CISO research is unanimous on this: shame-based security cultures have worse outcomes, because people hide incidents rather than report them.

When someone clicks, say publicly: “Jane clicked on a real phishing email this week. She caught it within 20 seconds and reported it, which is exactly what we train for. The email was a [X] variant — here’s what to watch for.” That’s the culture you want.

The specific metrics to track

You don’t need a SOC dashboard. You need four numbers:

  1. Click rate on simulated phishing: % of simulations that result in a link click. Starting baseline for most SMBs is 25–35%. Target: under 10% by month 6, under 5% by month 12.
  2. Credential submission rate: % of simulations that result in entering login credentials on a fake page. Starting baseline: 10–20%. Target: under 2%. This is your “real breach risk” number.
  3. Report rate: % of simulations that get correctly reported. Starting baseline: often under 5%. Target: over 50%. A high report rate is the single most important indicator of security culture.
  4. Time to report: median seconds between email delivery and report. Target: under 5 minutes.

Click rate gets all the attention but report rate is more important. A company where 20% of people click but 60% report is in much better shape than a company where 5% click and 5% report. Why? In the real-phishing case, the report rate determines how quickly IT can quarantine the email before more people click.

Common mistakes SMBs make

Mistake 1: Running one simulation and calling it done

Research is clear: single simulations don’t produce durable behavior change. You need a cadence of at least monthly exposures for at least 12 months before you see sustained improvement.

Mistake 2: Using simulations that are too easy (or too mean)

Templates that are “free iPad, click here!” train no one. Templates that spoof the CEO’s personal Gmail and offer “a special bonus for your anniversary” are cruel. The sweet spot is plausible-but-spottable: realistic vendors, realistic subject lines, genuine red flags that a trained eye can catch.

Mistake 3: Punishing employees who click

Discussed above, but worth repeating. Never fire, never shame, never CC the manager. If an employee is clicking repeatedly, offer them extra one-on-one training. Make the click a teaching event, not a disciplinary one.

Mistake 4: Exempting executives

The #1 spear-phishing target at any company is the CEO’s inbox, the CFO’s inbox, and the bookkeeper’s inbox. They need the most training, not the least. “The CEO is busy” is how $400,000 wire transfers get authorized to fake vendors.

Mistake 5: Running training and ignoring the infrastructure

Training reduces click risk. It does not fix underlying infrastructure. Before or alongside your training program, you should also:

SMB-sized phishing training, without the enterprise complexity.

ScamDrill’s organization plans are built for 5-to-250-person teams. Templates current with 2026 threats. One-click reporting. Automatic teaching pages. No 100-page CISO setup guide required.

See the organization plan →

The 90-day rollout

We cover a specific week-by-week rollout in our companion piece: Phishing Simulation for Small Business: A 30-Day Rollout Plan. The short version:

By day 90, most SMBs see click rates cut roughly in half and report rates jump 5–10x.

The ROI case, in one paragraph

Average phishing training program cost for a 25-person SMB: $3,000–$6,000 per year. Average cost of a ransomware breach at an SMB: $120,000, not counting reputational damage, lost customers, and the 60% probability of business closure within six months. If training reduces breach probability by even 30% in a given year — a conservative number given the research — the expected value of the training program is wildly positive. You don’t need to be a risk analyst to do this math.

Start this quarter

If you’ve been putting off security awareness training because it seemed like a big enterprise program, please reconsider. For small businesses, the setup is genuinely a few hours of work, the cost is a few dollars per employee per month, and the downside risk you’re mitigating is existential.

The attackers have automated their side of this. You need to have automated defense. And the cheapest, most effective piece of that defense — by a wide margin — is ongoing phishing simulation with in-the-moment teaching.

For the step-by-step rollout, read our 30-day phishing simulation rollout plan for small business. For the family/consumer version of the same concept, see phishing simulation for families.

Frequently asked questions

How much does a phishing training program cost for a small business?

Small-business plans from established vendors typically run $3-6 per employee per month, billed annually. For a 25-person company that's roughly $1,500 a year — less than the cost of one successful business-email-compromise attack. Lighter-touch services aimed at families and small teams run lower. Free DIY tools exist (GoPhish, KnowBe4 free tier) but require IT lift to deploy and are rarely worth the labor for businesses under 50 employees. Skip the platforms with enterprise-only sales motions — they tend to under-serve sub-100-person companies.

What's the ROI on phishing simulation training?

Quantifiable. Industry data consistently shows a baseline employee click rate of 30-45% on the first untrained simulation, dropping to under 5% within six months of monthly simulations. The average cost of a single business-email-compromise incident in 2024 was $137,000 per the FBI. A program that prevents one incident over a five-year horizon pays for itself many times over, and the data your insurer wants is already produced as a side effect. The non-monetary ROI is cultural: employees who feel competent at spotting scams flag suspicious messages internally, which catches the ones the simulation didn't cover.

Is phishing training required for SOC 2 or cyber insurance?

It's effectively required for both, even when not formally listed. SOC 2's Common Criteria CC1.4 covers personnel competence and awareness, which auditors interpret as 'documented security training, including phishing-specific exercises, on a regular cadence.' Cyber insurance underwriters now ask about phishing simulation cadence on every policy questionnaire — businesses without a documented program either pay higher premiums or are denied coverage. Either control alone justifies the spend; together they make it a non-negotiable line item for any business processing customer data or carrying cyber liability.

Will phishing training really reduce our click rate?

Yes, by an order of magnitude — but only if simulations run monthly and include a debrief, not just a 'gotcha' page. The well-replicated pattern: untrained baseline of 30-45% click rate, post-first-simulation rate of 20-25% (people are now suspicious of internal email broadly), and a settled rate under 5% by month six. Skipping the debrief or running drills only quarterly halts the curve at around 15%. The training, not the test, is what changes behavior. Pair every simulation with a 60-second post-click explanation of the red flags.

Join our free newsletter to stay ahead of the scammers

Receive updates on monthly scam trends, along with best practices to protect yourself and those you care about.