Security Think Tank: Three-pronged approach to phishing prevention

What are the most effective types of security controls and end user training approaches to dealing with phishing?
Source: Computer Weekly