Mechanisms exist to incorporate submissions from users of phishing attempts, spam or otherwise malicious actions to better protect the organization.
Does the organization incorporate submissions from users of phishing attempts, spam or otherwise malicious actions to better protect the organization?