32.4%
Average phishing simulation click rate for organizations with no prior training program
Drop to under 5%
Average click rate reduction after 12 months of monthly simulations with training
Over 70%
Percentage of data breaches involving a phishing or social engineering component
Average report rate reaches 25-35%
Employees who report a simulated phishing email within the first year of a well-run program

Phishing simulation programs work when they are designed as behavior change programs, not compliance checkboxes. The distinction matters operationally: a compliance program runs annual training videos and measures completion rates. A behavior change program runs monthly simulations, delivers training at the moment employees make a risky decision, tracks click rates quarterly by cohort, and uses that data to calibrate simulation difficulty and training content. Organizations that treat phishing simulation as a behavior change initiative consistently reach click rates below 5 percent within 12 months. Organizations that treat it as an annual compliance activity see click rates plateau above 20 percent indefinitely.

This guide covers the full operational setup: choosing a platform, designing a template library across three difficulty tiers, establishing a monthly simulation cadence, configuring just-in-time training delivery, measuring behavior change with the right metrics, and reporting results to leadership in a format that communicates risk reduction. The guide also covers the employee relations aspects of running simulations without damaging trust, and how to handle pushback from legal, HR, or employees who object to the practice.

Platform Selection: KnowBe4, Proofpoint, Cofense, and GoPhish

The right platform depends on your organization's size, budget, and whether you need a fully managed service or a self-operated tool.

KnowBe4: The market-leading platform by installed base, with the largest template library (over 50,000 phishing templates), built-in training content, and strong reporting dashboards. Notable features: PhishER for triaging employee-reported emails, AI-driven template recommendations based on industry, and the Security Awareness Proficiency Assessment (SAPA) for baseline knowledge measurement. Pricing is per-seat on annual contracts; mid-market pricing ranges from $20 to $50 per user per year depending on tier. Best suited for organizations wanting a comprehensive, self-operated platform with minimal setup friction.

Proofpoint Security Awareness Training: Strong integration with Proofpoint's email security gateway, which enables automatic simulation triggering based on real phishing themes detected in your environment. The threat-correlation feature means employees receive simulations themed around actual attacks targeting your organization rather than generic templates. Includes targeted attack protection and Very Attacked People (VAP) reporting that focuses training resources on highest-risk users. Best suited for organizations already using Proofpoint for email security.

Cofense PhishMe: Specializes in conditioning employees to report suspicious email rather than just measuring click rates. The Cofense Reporter button and the Cofense Triage platform create a complete reporting and triage workflow. Cofense's approach emphasizes building a human sensor network: employees who report phishing generate intelligence that feeds back into the simulation program. Best suited for organizations with a dedicated SOC wanting to build employee-as-sensor capability.

GoPhish (open source): A free, self-hosted phishing simulation framework with a web-based management interface. Appropriate for organizations with limited budget and internal technical capability to host and operate the platform. Limitations: no built-in training content library, no automatic reporting integrations, and requires manual template management. Sufficient for small organizations running quarterly simulations; inadequate for enterprise programs needing centralized management, learning management system (LMS) integration, and advanced cohort analytics.

Decision framework:

  • Under 500 employees, budget-constrained: GoPhish plus free training content from SANS Security Awareness
  • 500 to 5,000 employees: KnowBe4 Silver or Proofpoint Essentials
  • 5,000+ employees or heavy email security investment: KnowBe4 Platinum, Proofpoint, or Cofense

Template Design: Three Difficulty Tiers

Template difficulty determines whether simulations challenge employees appropriately as the program matures. Running only easy templates keeps click rates artificially low; running only hard templates discourages employees and inflates click rates without teaching recognizable signals.

Tier 1: Easy (use for baseline measurement and new hires) Characteristics: obvious phishing signals, generic lure, poor grammar or suspicious sender domain. Examples: password expiry notice from a generic IT@ address at a clearly wrong domain, delivery notification from a domain that slightly misspells a known carrier (fedx.com), invoice from an unknown vendor. Expected click rate for naive users: 30 to 50 percent. Use Tier 1 templates for your initial baseline simulation before training begins, and for new hire onboarding simulations.

Tier 2: Medium (primary training vehicle) Characteristics: legitimate-looking sender domain (using lookalike or subdomain spoofing), plausible business context, no obvious grammar errors. Examples: Microsoft 365 sign-in alert from a lookalike domain (microsoftonline-security.com), HR benefits enrollment reminder, DocuSign agreement from a domain mimicking a known vendor. Expected click rate for trained users: 10 to 20 percent. Tier 2 is the workhorse of a mature program: run it monthly for the general employee population.

Tier 3: Hard (for security-aware employees and executives) Characteristics: highly targeted, uses real organizational context (names, projects, vendors), sent from a convincing domain, requires no link click for credential collection (credential harvesting form hosted on a legitimate-looking page). Examples: a request from a named colleague to review a shared document on what appears to be your organization's SharePoint, a calendar invite from an executive assistant, a vishing voicemail with a callback number. Expected click rate even for trained users: 5 to 15 percent. Use Tier 3 for executives, IT administrators, and employees who have achieved below 2 percent click rates on Tier 2 simulations.

Template variety: Rotate across lure categories to prevent employees from recognizing templates by theme rather than developing genuine detection skill. Categories to rotate: IT notifications, HR communications, finance and payroll, package delivery, executive requests, vendor invoices, collaboration platform alerts (Teams, SharePoint, Zoom), and industry-specific themes.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Simulation Cadence and Scheduling

Simulation frequency is the primary driver of behavior change. Monthly simulations consistently outperform quarterly in reducing click rates because the conditioning effect requires repetition at a frequency that keeps the skill fresh.

Recommended cadence by maturity stage:

Year 1 (baseline to trained): Monthly simulations for all employees. Run Tier 1 in the first month to establish baseline. Transition to Tier 2 by month 3. Target: reach below 10 percent click rate by month 12.

Year 2+ (maintaining behavior): Monthly simulations for general population, with Tier 3 simulations quarterly for high-risk groups (executives, IT, finance). Target: sustain below 5 percent click rate across Tier 2 templates.

Scheduling considerations: Distribute simulation sends across the week to avoid day-of-week artifacts. Sending all simulations on Tuesday morning will eventually teach employees that Tuesday emails are tests. Use your platform's randomized send window feature to spread sends across 2 to 5 business days.

Avoid simulating during: major holidays, peak business periods (quarter-close for finance teams, open enrollment for HR), immediately following layoffs or major organizational changes. Employee goodwill toward the program is a resource; burning it with poorly timed simulations produces backlash that undermines training effectiveness.

Exclusions and safe lists: Exclude executives from certain simulation types that could generate escalation noise (CFO clicking a fake invoice link may trigger a real vendor investigation). Add your phishing simulation sending domains to your email security gateway's allow list to prevent the platform's test emails from being quarantined before delivery. Many simulation platforms provide dedicated allow-listing documentation for major email security products.

Notification policy: Decide upfront whether to disclose the simulation program to employees. Most security leaders prefer disclosure: tell employees that phishing simulations will occur periodically, that clicking training links is not a punishable offense, and that reporting suspected phishing is the target behavior. Transparency builds trust and encourages reporting; surprise-based programs tend to generate HR complaints and legal questions in organizations with strong employee privacy cultures.

Just-in-Time Training Delivery

Just-in-time (JIT) training is the mechanism that produces behavior change. Standard annual training creates knowledge that decays rapidly. JIT training delivers a targeted learning moment at the exact moment an employee demonstrates the vulnerable behavior, when they are most receptive.

How JIT training works: When an employee clicks a simulated phishing link, instead of (or in addition to) landing on the phishing page, they are immediately redirected to a brief training module explaining: exactly what made this email a phishing attempt, the specific indicators they should have noticed (lookalike domain, urgency language, generic greeting, hover-over URL mismatch), and what to do when they encounter similar emails. The training module should be 2 to 5 minutes maximum, focused, and immediately applicable.

JIT training design principles:

  • Connect the training directly to the specific template that was clicked. Generic phishing training videos shown after any click are less effective than training that references the exact indicators in the email the employee just clicked.
  • Avoid shame or punitive framing. Research consistently shows that shame-based responses reduce reporting rates as employees fear the consequences of acknowledging mistakes rather than reporting them.
  • End the training with a single clear action: "Next time you see an email like this, click the Phish Alert Button to report it to the security team."
  • Keep the training to one key lesson per interaction. Overwhelming employees with multiple concepts after a single click reduces retention of all of them.

Configuring JIT in your platform: KnowBe4 delivers training modules automatically on click through its integrated LMS. Proofpoint Security Awareness Training links click events to targeted training assignments. Both platforms allow you to customize which training module is assigned based on the template category that was clicked, enabling topic-specific training delivery.

Tracking JIT completion: Monitor training completion rates alongside click rates. An employee who clicks and completes JIT training is more valuable to your program than one who clicks but does not complete training. Low JIT completion rates may indicate the training modules are too long, inaccessible on mobile, or blocked by corporate content filtering.

Metrics That Measure Real Behavior Change

Click rate is the most-reported metric and the least predictive of real security improvement. A team of 10 people where 1 person clicks every month has a 10 percent click rate. A team of 100 where 2 different people click each month has a 2 percent click rate but double the exposure. The metrics that matter are cohort-level trends over time and the report rate.

Primary metrics:

Click rate trend by cohort: Track click rates for the same population over consecutive simulations. A 25 percent click rate in month 1 dropping to 8 percent in month 6 and 3 percent in month 12 demonstrates real behavior change. A click rate that stays flat at 15 percent across 12 months indicates the training content is not driving change.

Report rate: The percentage of simulated phishing emails that employees actively report to the security team using a reporting button or forward address. Report rate is the single best indicator of security culture maturity. Organizations with strong programs see report rates reach 25 to 40 percent within 18 months. High report rate means employees are treating suspicious emails as a shared security responsibility rather than ignoring them.

Credential submission rate: Among employees who click a simulated link, what percentage enter credentials on the landing page? Clicking a link is bad; entering credentials is significantly worse. Track this separately as an indicator of the subset of employees who require targeted intervention.

Repeat clickers: Identify employees who click in three or more consecutive simulations. Repeat clickers are high-risk individuals requiring targeted intervention beyond standard training: one-on-one coaching, role-based training, or in extreme cases, access restrictions pending training completion.

Leadership reporting format: Present quarterly to leadership using: overall click rate trend (chart), department-by-department comparison (bar chart), report rate trend, number of repeat clickers and their resolution status, and a before/after comparison against the program start baseline. Frame results as risk reduction: "Employees successfully blocked X percent of simulated phishing attempts this quarter versus Y percent one year ago, representing a Z percent reduction in credential theft risk surface."

Handling Pushback and Legal Considerations

Phishing simulation programs generate pushback from multiple directions. Anticipating and addressing these objections in the program design phase prevents them from derailing the program after launch.

HR and employee relations concerns: HR teams sometimes object to phishing simulations as deceptive or as creating a punitive culture. Address this by: framing the program explicitly as training rather than testing, establishing a written no-punishment policy for clicking (document that click data is used for program improvement and individual coaching only, never for performance reviews or disciplinary action), communicating the program to all employees before it launches, and involving HR in the program governance and reporting structure.

Legal and privacy concerns in regulated environments: In jurisdictions with strong employee privacy laws (EU member states under GDPR, California, certain Canadian provinces), email monitoring and phishing simulations may require works council or union consultation, privacy impact assessments, or explicit disclosure to employees. Consult employment counsel before launching in these jurisdictions. The specific legal requirements vary significantly by country and collective bargaining agreement.

Union considerations: In unionized environments, introducing a monitoring program (even voluntary training) typically requires good-faith bargaining with the union before implementation. Failure to do so can result in unfair labor practice charges. Involve labor relations early.

The ethics of simulation: Some practitioners and ethicists object to simulations that exploit genuinely emotionally charged lures (fake COVID notifications, fake HR termination notices, fake family emergency alerts). The counterargument is that real attackers use exactly these lures, and training employees against them with a safe simulation is more ethical than leaving them unprepared. A pragmatic middle ground: use emotionally charged lures only at Tier 3, for security-aware employees who have been explicitly told the program uses all lure types, and never use lures that could cause genuine harm if an employee acts on them outside the simulation context.

The bottom line

A phishing simulation program that runs monthly, delivers just-in-time training on click, and tracks report rate alongside click rate will reduce credential theft and BEC risk measurably within 12 months. The platform matters less than the operational discipline: consistent monthly cadence, progressive template difficulty, and cohort-level metric tracking are what drive behavior change. Start with a baseline simulation before any training, establish a no-punishment click policy in writing, and report quarterly to leadership using trend data rather than point-in-time scores.

Frequently asked questions

How often should phishing simulations be run?

Monthly is the industry standard for organizations wanting measurable behavior change within 12 months. Quarterly simulations maintain some conditioning but research consistently shows monthly cadence produces 40 to 60 percent greater click rate reduction over a 12-month period. The minimum effective frequency is monthly; more frequent simulations (bi-weekly) show diminishing returns and can generate employee fatigue that reduces cooperation with the program.

Should you tell employees about the phishing simulation program?

Yes, for most organizations. Disclosing that simulations will occur builds trust, encourages voluntary participation, and reduces the HR and legal friction that surprise programs generate. Disclosure does not significantly reduce the program's effectiveness: employees knowing simulations occur does not prevent them from clicking, as real phishing exploits the same cognitive shortcuts regardless of whether employees know to be vigilant. The report rate (employees proactively flagging suspicious emails) tends to be higher in disclosed programs.

What is a good phishing simulation click rate?

Industry benchmarks from KnowBe4 and Proofpoint show average click rates of 30 to 35 percent before any training, dropping to 10 to 15 percent after 90 days of training, and 4 to 6 percent after 12 months of monthly simulations with JIT training. Target below 5 percent for Tier 2 (medium difficulty) templates as your 12-month goal. A 5 percent click rate on medium-difficulty templates indicates a program is performing well. Rates below 2 percent on Tier 2 templates are achievable with consistent programs and indicate high security culture maturity.

Can GoPhish be used for enterprise phishing simulations?

GoPhish works for small organizations running simple simulations, but it lacks several enterprise requirements: no integrated LMS for training delivery, no automated cohort analytics, no integration with HR systems for new hire automation, and no template library. Security teams using GoPhish need to build training delivery and reporting workflows manually. It is a viable option for organizations with under 200 employees, technical staff to operate it, and a separate training content source.

What lure categories are most effective for training?

The most effective training lures are those your employees are most likely to click, which vary by organization type. Across industries, the highest-click categories are IT notifications (password expiry, MFA enrollment, account security alerts), HR communications (benefits enrollment, payroll updates), and package delivery notifications. Finance and executive teams click at higher rates on invoice and payment-related lures. Use your organization's industry sector and the Tier 2 template library in your platform to identify the highest-engagement themes for your specific population.

How do you measure phishing simulation ROI for leadership?

Present ROI in risk reduction terms rather than compliance terms: calculate the cost of a credential-based breach (average BEC loss from FBI IC3 data is over $125,000 per incident), multiply by the reduction in susceptible employees the program has produced, and compare to program cost. Example: 500 employees, click rate reduced from 30 percent to 5 percent means 125 fewer employees who would click in a real attack each month. At even 1 percent conversion from click to successful credential theft, the program has materially reduced expected loss. Program cost (platform plus staff time) is typically $50 to $100 per employee per year versus average BEC losses of $125,000 per incident.

Sources & references

  1. CISA: Phishing Guidance for Organizations
  2. Proofpoint State of the Phish Report 2025
  3. KnowBe4 Phishing Industry Benchmarking Report
  4. NIST SP 800-50: Building an Information Technology Security Awareness and Training Program
  5. Cofense Phishing Defense Center Annual Report

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.