- Source: CISA
- This infographic provides a summary of how threat actors execute successful phishing attacks. Details include metrics that compare the likelihood of certain types of “bait” being click on. CISA recommends stakeholders use this information to help educate their workforce on how to spot and avoid phishing attacks.