What does “counting clicks” in live phishing tests tell you? There are really a lot more questions than answers.

Here are some of the variables that are rarely considered when reporting on live phishing tests:

1. Did the employee guess suspect a test based the subject line?
2. Did security software block messages from reaching users?
3. Were some employees away from work during the test period?
4. Did some recognize and click on a test message “just to see it”?
5. What was the message content’s difficulty compared last time?
6. Was the subject line more (or less) compelling than last time?
7. Did somebody tell others about a suspected a phishing test?
8. What could have impacted the number of “detected opens”?
9. What can you infer about people who reported AND clicked?

Security awareness paradox

It’s been a “super-fantastic” experience to see people learning and talking about security threats.

For just $325 USD, you can run a 6 week, automated program for gamified phishing awareness training and challenges.  (Limited time offer. Normally valued at $999 USD)

Use Promo Code: 6WEEKS

    On top of these variables, you should also consider how many data points you actually collected regarding “clicks” and “reports”. Phishing test scores usually focus on “how many clicked”, as a percentage of all messages sent. This is usually below 25%.

    Ideally, you also get a count of “how many reported” a message. There is often less focus on this number, and it is often lower than those who clicked. But this doesn’t tell us anything about “how well they understood” how to analyze a phishing message.

    Live tests can provide some useful information, but they have so many variables, the data is often very unreliable. This is all aside from the other ethical, cultural and educational issues that are also associated with live phishing tests.

    Phishing education and remediation needs to be more supported by a more consistent, robust and inclusive methodology to provide the kinds of results executives need.

     

    Scott Wright is CEO of Click Armor, the gamified simulation platform that helps businesses avoid breaches by engaging employees to improve their proficiency in making decisions for cyber security risk and corporate compliance. He has over 20 years of cyber security coaching experience and was creator of the Honey Stick Project for Smartphones as a demonstration in measuring human vulnerabilities.

    Cyber Security

    Phishing Defense

    Phishing threatens businesses and opens the door to ransomware. Fight phishing and spear phishing attacks with gamified learning.

    Social Engineering Defense

    Social engineering scams are a serious hazard to businesses. Fight back with Click Armor.

    Cyber Security Awareness for Remote Workers

    Home-based workers are vulnerable to cyber attacks. Build team immunity today.

    Privacy and Compliance

    PCI Compliance Awareness

    When team members work in an environment where they may encounter cardholder data, they need to know what to do to protect it.

    Gamified HIPAA Compliance Awareness

    If your business is a supplier to a healthcare provider in the USA or Canada, your team needs to know what to do to protect Protected Health information (PHI).

    Gamified Learning Platform

    Active Awareness Platform

    Experience the power of tailored gamified learning with Click Armor. Take your security awareness training to the next level.