Why is empowering employees to recognize and report suspicious activity crucial in phishing defense?

(Select The Best Answer)