Based on 11 million phishing simulations, this report reveals why phishing still works in 2026 and what employees actually click.
Shortcuts:
There are many variations of passages of Lorem Ipsum available, but the majority have suffered alteration in some form, by injected humour believable.
Based on 11 million phishing simulations, this report reveals why phishing still works in 2026 and what employees actually click.
We should have solved the problem of email phishing by now. We’ve had decades to learn, layers of technical protection, and entire security awareness programs dedicated to stopping it. And yet, phishing is still one of the most successful cybercrime methods in 2026.
Real-world data from more than 11 million phishing simulations sent in 2025 shows a clear pattern: people continue to click; not because they don’t know better, but because the attacks are built for how people actually behave at work.
Across ten European countries, phishing emails that appeared to come from HR or IT, used local languages, or mirrored routine workplace processes consistently generated the highest click rates. Even highly trained users weren’t immune. In fact, some of the most effective phishing lures mimic day-to-day work activities, for example employee surveys and calendar reminders.
The results were striking. Average click rates ranged from 3.4% in Poland to 6.1% in Estonia, showing that while awareness helps, psychology plays a strong role, regardless of geography.
Phishing hasn’t survived for 30 years because people are careless. It survives because attackers understand human behavior better than most defenses do.
In the next blog, we’ll explore the psychological triggers that make phishing so hard to resist, even for experienced, security-conscious professionals.
To learn more about phishing trends, download the latest report using real usage data from Nimblr.
Download the report Why phishing still works in 2026.
Related Resources