Resources ⋅ Threat Briefing
The Economics of Social engineering
The cost of attacking your organisation by phone just collapsed. Your defences haven't moved. Here's what changed, why it matters, and what good defence actually looks like.
$3B+
Lost to business email compromise annually
FBI IC3 Report 2024. The majority involving a phone call at some stage of the attack
~£0
Marginal cost of an AI-powered vishing call in 2025
The barrier to volume phone-based social engineering is now effectively zero
86%
Reduction in susceptibility with continuous simulation training.
KnowBe4 Phishing Benchmarking Report 2025 · 14.5M users · 67.7M simulated tests
The Shift
What changed... and what didn't
Vishing required skill
Effective phone-based social engineering needed a trained operator. Someone who could read a person, improvise when challenged, maintain a cover story under pressure, and adapt in real time. That skill was the bottleneck. It made volume attacks impractical and limited who could run them.
Vishing requires a script
AI-driven calling platforms can run hundreds of simultaneous calls, adapt to responses, handle common objections, and sound entirely credible. The skill ceiling is gone. The only remaining constraint is a list of names and a plausible pretext. Both are cheap to acquire.
Cost per call: near zero
A phishing email costs fractions of a penny and goes to millions. A vishing call used to cost real money: operator time, preparation, risk of exposure. That differential has collapsed. Phone attacks are now as scalable as email attacks, with significantly higher compliance rates.
Defence is still manual
Most organisations have some phishing awareness training. Almost none have trained their people to challenge a caller, verify identity under pressure, or escalate when something feels off. The attack surface changed. The defence didn't.
The honest truth
You can't read your way to a reflex
Every organisation that's run a well-designed vishing simulation reports the same thing: people who were confident they'd handle a suspicious call correctly often don't, until they've been on the receiving end of one.
This isn't a criticism of those people. It's an accurate description of how humans learn. Reflexes are built through rehearsal, not instruction. You don't learn to drive by reading the highway code. You don't learn to handle a vishing call by completing a module about vishing calls.
The good news is that the behaviour transfer is fast once exposure happens. A single well-designed simulation, one that puts people under real pressure, scores their response, and gives immediate feedback, changes how they behave in a way that weeks of e-learning doesn't.
The investment required is modest. The gap it closes is significant. The question is whether your organisation closes it before an attacker finds it first.
A single, well-designed simulation changes how people behave in a way that weeks of e-learning simply can't.
Ready to test your people?
CTRL+Vish puts your high-risk roles under real pressure before an attacker does. Training, practice line, live simulations, risk scoring.
You'll talk to a real human... we promise.