https://www.cisoplatform.com/profiles/blogs/how-to-design-an-effective-phishing-simulation?xg_source=telegram
Checking out "How to design an effective phishing simulation ?" on CISO Platform: