🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Design Phishing Simulations and Training for the Latest Threats: Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-10-3

Practical guidance for designing, running, and documenting phishing simulations and training to satisfy ECC‑2:2024 Control 1‑10‑3 and reduce human risk in small businesses.

April 10, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Phishing simulations and targeted training are a compliance and risk-reduction imperative under Essential Cybersecurity Controls (ECC – 2 : 2024) Control 1‑10‑3: design realistic exercises that reflect the latest threats, measure user behavior, and provide immediate remediation and learning to reduce exposure to credential theft, business email compromise, and malware delivery.

Control objective and practical scope for Compliance Framework

The core objective of Control 1‑10‑3 is to ensure organizations regularly test and train staff against contemporary phishing techniques and to retain evidence of program activities for compliance verification. For a small business this means a documented phishing program (policy, schedule, roles), repeatable campaign design that mimics realistic threats, measurable outcomes, and an auditable trail: campaign plans, email templates, simulation logs, training completions, and post-campaign remediation records.

Design principles and campaign planning

Start with a baseline assessment: run a low‑risk, broad-spectrum simulated campaign to capture click/report rates and patterns by department. Segment users by role and exposure (finance, HR, execs, remote workers) to create role‑specific scenarios. Define a cadence: monthly low-fidelity campaigns for general staff, quarterly high-fidelity (spear‑phish) simulations for high-risk targets, and annual executive "whale" tests with white‑glove oversight. Document objectives for each campaign (e.g., increase report rate by 25% in six months) and keep a campaign playbook that maps scenarios to mitigation actions.

Scenario examples for a small business

Practical scenarios that reflect current threat vectors: (1) Invoice/Payment update sent to the finance team mimicking vendor changes; (2) HR payroll update aimed at payroll processors asking to confirm bank details; (3) Remote‑worker VPN/SSO re‑enrollment lure for distributed employees; (4) Calendar invite with a "meeting room change" link for hybrid workers. Use each scenario to test specific controls such as URL‑inspection, attachment sandboxing, and multi‑factor authentication fallback.

Technical implementation details

Choose a phishing simulation platform that integrates with your environment—commercial (KnowBe4, Cofense) or open source (GoPhish). Host simulations on a segregated server or vendor infrastructure, and register a controlled sending domain or subdomain (e.g., phish-sim.company.test or company-sim.example) to avoid interfering with production DKIM/SPF/DMARC. Configure SPF to include the simulation sending IP, sign messages with DKIM, and set DMARC for the subdomain to avoid delivery issues. Use TLS for mail submission and ensure landing pages are safe: never collect real credentials—capture simulated data in a secure, isolated database or simply record the event and immediately redirect users to a remediation page.

Integration and telemetry

Integrate simulation results with your ticketing and SIEM. Use webhooks or APIs to push incidents into your vulnerability/training platform and generate remediation tickets for repeat offenders. Log SMTP transaction IDs, message IDs, recipient lists, URLs clicked, and timestamps for audit evidence. Retain logs per the Compliance Framework retention policy (typically 1–3 years) and produce monthly trend reports: click rate, report rate (users using “report phishing” function), mean time to report, and number of repeat offenders.

Training and remediation design

Pair each failed simulation with immediate microlearning: a short interactive module (<5 minutes) explaining the red flags in the message the user clicked and steps to report suspected phishing. For higher‑risk failures (entered credentials, clicked on high‑risk attachments), require completion of a longer training module plus manager notification and follow‑up verification. Implement spaced retraining and follow-up simulations to reinforce learning: users who fail twice in six months receive an elevated remediation path. Track completion certificates and attach them to the user’s HR or compliance record as evidence.

Compliance tips, privacy, and legal considerations

Obtain executive and HR buy‑in and formalize the simulation program in policy—include purpose, scope, data handling, opt‑out process (for legitimate medical/privacy reasons), and escalation paths. For small businesses operating in GDPR/CCPA jurisdictions, document lawful basis for processing employee data (usually legitimate interest) and minimize personal data collected during simulations. Exclude external partners and vendor contacts to avoid accidental disclosure. Keep an audit trail of approvals for high‑risk or executive campaigns, and maintain a list of "Do Not Test" accounts (e.g., active incident response staff, postpartum sabbatical employees).

Risks of not implementing Control 1‑10‑3

Without a formal phishing simulation and training program you increase the likelihood of successful compromise: stolen credentials leading to ransomware or BEC, fraudulent wire transfers, and lateral movement inside the network. From a compliance standpoint, absence of documented testing and remediation can lead to failed audits, regulatory penalties, and loss of customer trust. For a small business, a single compromised executive email can result in significant financial loss and disruption.

Best practices and measurable goals

Set measurable targets: reduce click rate to under 10% within 12 months, increase report rate to >60%, and reduce mean time to report to under 15 minutes for prioritized groups. Use progressive difficulty and realistic context in templates, but always ensure phishing simulations are non‑malicious and contain safe landing pages. Maintain a continuous improvement loop: review attacker trends (typosquatting, MFA‑prompting apps, AI‑generated messages), update scenarios quarterly, and coordinate with technical controls—enforce MFA, harden email gateway rules, enable attachment sandboxing and URL rewriting—so simulations map to mitigations you can verify technically.

Summary: Implementing ECC‑2:2024 Control 1‑10‑3 requires a documented phishing simulation program tailored to your organizational risk, realistic and role‑based scenarios, integrated telemetry and remediation, and careful attention to privacy and legal constraints; for small businesses, a pragmatic, repeatable approach using segmented campaigns, immediate microlearning, and measurable targets will measurably reduce human risk and create auditable evidence for compliance.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes