Why Most Phishing Simulations Fail
Most organisations run phishing simulations wrong. They send a generic “Your package is waiting” email, track click rates, name-and-shame repeat clickers in an all-hands meeting, and call it a training programme.
The result: employees feel surveilled, not educated. Click rates improve for two weeks post-campaign, then return to baseline.
This post covers the methodology we use with enterprise clients — one that measurably reduces susceptibility over 12-month rolling programmes.
The Three Principles
- Teach, don’t trap. Every simulation ends with immediate, contextual education — not a “gotcha” message.
- Segment by role. A finance team member faces different threats than a software engineer. Generic campaigns miss both.
- Measure learning, not just clicks. Track whether knowledge improves over time, not just whether people click.
Phase 1 — Planning
Define Objectives
| |
Choose Scenario Difficulty
| Level | Example | Target |
|---|---|---|
| Easy | Generic “IT password reset” | All staff — baseline |
| Medium | Branded HR benefits portal | All staff — month 3 |
| Hard | Spear phish referencing real project names | Privileged users |
Phase 2 — Infrastructure Setup
We use GoPhish for all client simulations — open source, auditable, no vendor lock-in.
| |
Phase 3 — Email Template Design
Good phishing templates have these characteristics:
| |
Example template — “IT Password Expiry”:
| |
Phase 4 — The Landing Page
This is where most simulations go wrong. A “gotcha” page kills the programme.
Bad: “You’ve been phished! Click here for mandatory training.”
Good: An immediate, context-specific lesson in the moment of failure:
| |
Phase 5 — Metrics That Matter
Track these over rolling 12 months:
| Metric | Month 1 | Month 6 | Month 12 |
|---|---|---|---|
| Click rate | 24% | 12% | 7% |
| Credential submission | 18% | 6% | 2% |
| Report rate | 3% | 14% | 28% |
| Time to report | 4.2 hrs | 1.8 hrs | 0.6 hrs |
The report rate is the most important metric. Employees who report suspicious emails are your best early-warning system — more valuable than any employee who just doesn’t click.
Common Mistakes to Avoid
- Over-targeting the same people — rotate randomly, don’t pile on repeat clickers
- No leadership buy-in — if the CEO is excluded, employees notice and resent it
- Immediate punitive action — treat clickers as teaching opportunities, not compliance failures
- One campaign per year — threat landscape changes monthly; your programme should too
- No positive reinforcement — publicly recognise employees who report phishing attempts
