The News
The 2026 Sagiss Managed Security Report finds that 72% of workers say AI-generated phishing is more convincing, with employee behavior (speed, multitasking, and after-hours communication) emerging as the primary driver of risk.
Analysis
AI Is Raising the Floor for Phishing Quality, Not Just Volume
Phishing isn’t new, but what’s changing is the baseline quality. The Sagiss report makes it clear that AI isn’t just increasing the number of attacks. It’s making them harder to distinguish from everyday communication.
When 72% of workers say phishing attempts are more convincing and 57% say they’re harder to spot because they feel more professional, it signals a shift in how attacks succeed. The old model of spotting the typo and questioning the sender doesn’t hold up when messages are well-written, context-aware, and aligned with normal workplace tone.
For developers and security teams, this reinforces a broader application reality: systems built around user judgment alone are becoming less reliable as AI improves the quality of malicious inputs.
The Real Risk Is in How Work Happens, Not What Workers Know
One of the more interesting takeaways here is that behavior becomes the primary issue instead of awareness. Employees already know they should verify messages. The problem is that they often act first and verify later. According to the survey:
- 63% clicked a link and later reconsidered
- 57% verified a request only after taking action
- 45% replied to a message and then questioned its legitimacy
This aligns closely with Efficiently Connected research showing that speed and automation pressures are reshaping how decisions get made across the application lifecycle. In this case, the “application” is human workflow, and it’s optimized for responsiveness, not caution.
For developers building internal tools, communication platforms, or security workflows, this is relevant. Risk isn’t just introduced through bad actors. It’s introduced through systems that prioritize speed without reinforcing verification.
Workplace Design Is Now a Security Variable
What stands out in this report is how strongly environment influences behavior. Workers are making mistakes in the middle of normal work conditions:
- 55% cite rushing between tasks as the biggest risk factor
- 48% point to multitasking
- 28% say message overload makes verification harder
This shifts the conversation from “train users better” to “design systems differently.” Security teams, and the developers supporting them, are starting to recognize that UX, workflow design, and notification patterns directly impact security outcomes. If systems reward immediate response, they also increase the likelihood of risky decisions.
AI Phishing Exploits Trust Signals Built Into Modern Workflows
Another subtle but important shift: phishing no longer needs to stand out; it succeeds by blending in. Workers reported trusting messages because they:
- Sound like a coworker (42%)
- Reference real workplace details (27%)
- Use natural, human tone (26%)
These are the same signals modern collaboration tools are designed to amplify: familiarity, personalization, and speed. AI simply makes those signals easier to replicate.
For developers, this creates a tension. The same features that improve productivity through contextual messaging, personalization, real-time communication also increase the attack surface when misused.
Looking Ahead
AI phishing is less about technical sophistication and more about operational reality. As messages become more polished, the differentiator shifts to how decisions are made under pressure.
This suggests a broader shift in application and security design. It’s not enough to detect threats.Systems may need to slow users down at the right moments, introduce friction intentionally, or provide contextual verification signals inline with workflows.
For developers, this is a reminder that security isn’t just a layer; it’s an experience. And as AI continues to blur the line between legitimate and malicious inputs, designing for human behavior under real-world conditions will become just as important as detecting the threat itself.
