Email security training is outdated.
Attackers moved on. Your team hasn't.
The problem: organizations still focus security awareness on email while threat actors exploit collaboration platforms. Teams, Slack, Zoom, Google Chat: these tools are now primary attack vectors.
Not secondary. Primary.
The Trust Problem
Collaboration platforms carry inherent trust.
When a message arrives via Teams or Slack, employees assume it's legitimate internal communication. No verification. No second thought.
Email gets scrutiny. Collaboration tools don't.
This creates a blind spot. Attackers know it. They exploit it.

Why Collaboration Tools Are Target-Rich Environments
Attackers impersonate coworkers and support staff through these platforms because users don't question them the same way they question email.
The psychological difference matters.
Email from unknown sender = suspicious.
Teams message from "IT Help Desk" = legitimate.
This trust advantage makes collaboration platforms more effective for social engineering than email ever was.
Organizations spent years training employees to verify email. That training doesn't transfer to collaboration tools.
Current Attack Patterns
Email Bombing + Teams Contact
Attack sequence:
- Flood employee inbox with junk emails
- Contact via Teams impersonating IT support
- Offer to "fix" the email problem
- Request remote access credentials
The employee is stressed. Inbox unusable. IT support reaches out at the perfect moment.
Convenient timing. Not coincidence.

Voice and Video Impersonation
Threat actors use deep-faked voices to sound like real employees.
They demonstrate familiarity with:
- Office layouts
- Coworker names
- Internal processes
- Recent projects
Conversations feel like normal internal support workflows.
No reason to doubt. Everything checks out.
Device Code Phishing
Attackers masquerade as Teams meeting invitations. Initiate chats. Build rapport.
Then prompt targets to authenticate using attacker-generated device codes.
Result: persistent access through valid authentication tokens.
Not a compromised password. A legitimate token obtained through social engineering.
Much harder to detect. Much harder to revoke.
Where Email Training Fails
Traditional security training emphasizes:
- Don't click suspicious links
- Verify sender addresses
- Look for spelling errors
- Hover over URLs before clicking
This training assumes the attack arrives via email.
Modern attack chains don't depend on email clicks.
Attackers use email bombing to create urgency and confusion. Then pivot to Teams or Slack for direct contact.
The actual social engineering happens in the collaboration tool. Not in email.
Your training prepared employees for the wrong platform.

The Verification Gap
Organizations teach employees to verify unexpected email contacts.
No one teaches verification for unexpected contacts inside collaboration tools.
Yet that's exactly where verification is now critical.
Employee receives Teams message from "IT Security" requesting credential verification. What do they do?
Most comply immediately. The message came through Teams. Must be legitimate.
Real-World Consequences
This isn't theoretical risk.
Organizations across industries report incidents where:
- Attackers gained initial access through collaboration platform social engineering
- Employees provided credentials to fake support staff via Teams
- Wire transfers initiated after Slack impersonation of executives
- Ransomware deployed after remote access granted through fake IT help
The common thread: attacks succeeded because users trusted the platform more than they trusted the request.
What Organizations Need to Do
Extend Security Training
Update training materials to reflect collaboration-era threats.
Include scenarios where:
- Coworkers request unusual information via Teams
- IT support contacts via Slack requesting remote access
- Executives send urgent requests through chat platforms
Practice the same verification habits across all communication channels.
Not just email.

Establish Verification Protocols
Create clear procedures for verifying identity through collaboration tools.
Examples:
- Callback verification for any credential requests
- Secondary confirmation channel for financial transactions
- Verification questions only real employees would know
- Out-of-band confirmation for remote access requests
Make these protocols standard operating procedure.
Make Reporting Simple
Employees need an easy way to report suspicious activity within collaboration platforms.
If reporting is complicated, they won't do it.
Create dedicated channels or buttons for reporting concerns directly within Teams and Slack.
Reduce friction. Increase reporting.
Technical Controls
Implement platform-specific security features:
- Restrict external Teams communications
- Monitor for unusual chat patterns
- Alert on authentication attempts from collaboration tools
- Require approval for remote access requests initiated via chat
Technology supplements training. Not replaces it.
Regular Awareness Updates
Threat patterns evolve quickly.
Quarterly training on emerging collaboration platform attacks keeps security awareness current.
Share real examples. Show actual attack messages. Demonstrate how attackers sound.
Generic training doesn't prepare employees for specific threats.
The Bottom Line
Email security awareness remains important.
But it's insufficient.
Attackers operate where users let their guard down. Currently, that's collaboration platforms.
Organizations that focus exclusively on email security while ignoring Teams and Slack expose themselves to exploitation.

We help organizations extend security awareness beyond email to cover the full communication landscape. That includes collaboration platforms, authentication procedures, and incident response protocols.
Need help assessing your current security training gaps? Get in touch.
Your team uses collaboration tools daily. Make sure they're using them safely.
Category: blog

