Example logical diagrams of such a system are shown in the figures, where like referenced numbers correspond to similar elements. In some embodiments, the system can be configured to transmit or otherwise generate simulated phishing messages. This feature is optional, and is not necessary to enable the detection and remediation features described here.