68%
Of breaches involve a human element — social engineering, credential misuse, or error — per Verizon DBIR 2025
11.9%
Average phishing click rate before training across all industries, per KnowBe4 2025 benchmarks
2.1%
Average phishing click rate after 12 months of continuous training — a 5.7x improvement
82 sec
Median time before first click on a phishing email after delivery — most clicks happen within 90 seconds

Security awareness training is mandatory in most compliance frameworks and present in nearly every enterprise security program — yet the majority of programs are designed to satisfy audit requirements rather than to change behavior. The difference between a program that reduces breach risk and one that reduces compliance findings comes down to how you measure success and what you do with those measurements.

This guide is for security program managers and CISOs evaluating or redesigning their security awareness programs. We cover the behavioral metrics that actually predict risk reduction, phishing simulation design principles that produce useful data rather than punitive checkboxes, program design for sustainable behavior change, platform evaluation criteria, and how to report program value to leadership in terms that drive continued investment.

Why Phishing Click Rate Is a Vanity Metric

Phishing simulation click rate is the metric most security awareness programs report as their primary outcome measure. It is the wrong metric for two reasons.

First, click rate measures susceptibility to simulated phishing — a context that employees increasingly recognize and respond to differently than real phishing. When an organization runs monthly phishing simulations, employees learn to be suspicious of any unusual email that arrives during the simulation window. This produces declining click rates that reflect simulation-detection skill, not improved security judgment under real-world conditions.

Second, click rate measures a single moment in the attack chain — the initial click — rather than the downstream behavior that determines whether a click becomes a breach. An employee who clicks a simulated phishing link and immediately reports it to the security team has demonstrated better security behavior than an employee who does not click but also would not report a real suspicious email. Click rate conflates these two very different security behaviors.

The metrics that actually predict risk reduction measure the full behavioral arc: did the employee recognize something was wrong? Did they report it? How quickly? Did they surrender credentials, or did they stop short of the most damaging action? Did their behavior improve over time across multiple measurement opportunities?

Behavioral Metrics That Actually Matter

Five metrics provide a meaningful picture of security awareness program effectiveness when tracked consistently over time.

Phishing report rate is the most undervalued metric in most programs. When an employee receives a suspicious email — simulated or real — do they report it via a phishing report button, and how quickly? A high report rate means your security team gets early warning of active campaigns. A rising report rate over time indicates that training is producing active security participation, not just passive compliance. Track report rate as a percentage of received simulations and as a ratio to click rate (report rate divided by click rate should be greater than 1.0 in a healthy program — more reporters than clickers).

Credential submission rate measures how many clickers actually entered credentials into a simulated phishing landing page. This separates accidental clicks (user immediately closed the browser) from high-risk behaviors (user entered their username and password). The credential submission rate is the metric most predictive of real breach risk — an employee who clicked but did not submit credentials represents a different risk profile than one who provided credentials.

Repeat click rate identifies employees who click across multiple phishing simulations. Repeat clickers are a concentrated risk population that warrants targeted intervention — additional training, temporary access restrictions, or manager engagement — rather than the same generic training assigned to everyone else. Track repeat clicker count as a program health indicator: a well-designed program should see repeat click rate decline over 12 months.

Time to report measures how quickly employees who do report suspicious emails submit their reports after receipt. Faster reporting gives the security team more time to respond before other employees click the same campaign. Trending time-to-report downward indicates increasing security confidence.

Security culture score is a qualitative metric derived from periodic employee surveys measuring security attitudes: do employees feel responsible for security? Do they know what to do when they encounter a suspicious situation? Do they feel supported rather than blamed when they make a mistake? Culture surveys administered annually provide leading indicator data that behavioral metrics lag.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts, distilled for practitioners. 50,000+ subscribers. No noise.

Phishing Simulation Design Principles

Most phishing simulations are designed to catch employees, not to produce useful training data. Simulations that are indistinguishable from real IT communications, sent without context, and followed by punitive consequences produce fear rather than learning — and fear correlates with lower report rates as employees become reluctant to report anything that might result in mandatory training.

Effective simulation design follows four principles. First, match simulation difficulty to employee baseline. The NIST Phish Scale provides a research-backed framework for rating phishing message difficulty across two dimensions: the number of persuasion techniques used (urgency, authority, fear, reward) and the relevance of the message to the target (generic versus role-specific). Run easy simulations as your baseline measurement tool and progressively more difficult simulations as training matures — not the reverse.

Second, time simulations to capture real security behavior rather than simulation-detection behavior. Avoid predictable monthly cadence that employees learn to anticipate. Use variable timing and avoid sending simulations immediately after security awareness months or training completion, when employees are primed to expect them.

Third, make training immediate, contextual, and brief. When an employee clicks, the teachable moment is right then — not in a one-hour training module assigned a week later. A 90-second interactive explanation of what signals in the simulated email should have triggered suspicion, delivered immediately on the phishing landing page, produces better behavior change than deferred mandatory training.

Fourth, measure behavior change, not compliance completion. Training completion rates (percentage of employees who completed assigned modules) measure compliance with the training mandate, not behavior change from the training content. Completion rates belong in compliance reports; behavioral metrics belong in security program reports.

Platform Evaluation: KnowBe4, Proofpoint, Cofense, and SANS

The security awareness training platform market is dominated by four vendors, each with meaningful differences in simulation library depth, reporting capability, and training content quality.

KnowBe4 is the largest platform by customer count and has the most extensive phishing template library — over 20,000 templates across industry verticals, attack types, and difficulty levels. Its PhishER module adds email analysis and response workflow for real phishing reports, creating a closed loop between simulation, training, and incident response. KnowBe4's reporting is the most mature in the market for tracking per-user behavior over time. Its weakness is content quality — the training module library is broad but depth varies, and some content feels dated.

Proofpoint Security Awareness Training (formerly Wombat) has the strongest integration with Proofpoint's email security platform. Organizations already using Proofpoint for email filtering gain native integration between real phishing threat intelligence and simulation content — simulations can be built from actual phishing emails intercepted by the email gateway, providing the most realistic simulation fidelity available. Its Very Attacked People (VAP) analytics identify the highest-risk employees based on actual threat actor targeting patterns.

Cofense focuses specifically on phishing simulation and threat response, with less emphasis on general security awareness training content. Its Reporter button integration and PhishMe simulation platform produce the highest phishing report rates of any platform in benchmarking studies. For organizations where phishing response speed is the primary program metric, Cofense's specialized focus on that workflow is a differentiator. Its general security awareness content library is smaller than KnowBe4 or Proofpoint.

SANS Security Awareness is the strongest platform for content quality — particularly technical content aimed at security-aware employees rather than general staff. Its role-based training paths for developers, IT administrators, and executives are more technically rigorous than alternatives. SANS is best suited for organizations with higher-than-average baseline security literacy and a need for role-differentiated training depth.

Program Design for Sustainable Behavior Change

Annual compliance training does not change behavior. A one-hour annual module followed by eleven months of no security communication produces the same click rates twelve months later as before the training — behavior change requires repeated, spaced practice with timely feedback.

Effective program structure distributes security communication throughout the year: monthly phishing simulations of varying difficulty, brief (under 5 minutes) monthly security tips delivered via email or intranet aligned to current threat trends, quarterly role-specific training modules for high-risk employee populations (finance, HR, executive assistants, IT administrators), and annual comprehensive awareness training as a program anchor.

Just-in-time training triggered by behavior delivers the highest per-minute training ROI. An employee who clicks a phishing simulation receives a 90-second interactive module immediately. An employee who installs unapproved software receives a brief explanation of why that action triggered a policy. An employee who submits a phishing report receives positive reinforcement within 24 hours acknowledging their contribution. These moment-of-behavior interventions produce 3x better retention than scheduled training according to learning science research on spaced repetition.

Repeat offender programs require a different approach than general population training. Identify employees who click across three or more consecutive simulations and design an escalating intervention path: additional training modules first, then manager notification and engagement, then temporary access restrictions (reduced email permissions, additional MFA requirements) for persistent high-risk behavior. These employees represent a concentrated vulnerability that generic training will not address.

Reporting Program Value to Leadership

Security awareness programs struggle for budget because security leaders report compliance metrics (training completion rates) to executives who care about business risk. The translation layer between compliance activity and business risk reduction is where most awareness programs lose leadership support.

The business case for security awareness investment rests on one data point that executives understand: human element involvement in breaches. Verizon's DBIR (Data Breach Investigations Report) has reported human element involvement (social engineering, credential misuse, error) in 68% or more of breaches for the past five consecutive years. Every dollar invested in reducing human-element risk has a statistically significant expected return on breach cost reduction.

Present program metrics in business risk terms: 'Our phishing credential submission rate declined from 8.2% to 1.9% over 12 months. At our employee count of 3,500, this represents 220 fewer employees per phishing campaign who would have surrendered credentials to an attacker. Industry data places the average cost of a credential-based breach at $4.5M. This program reduced our expected annual breach cost from credential theft by approximately $X.' This framing connects program activity to board-level risk language.

Track program ROI as the ratio of estimated breach cost reduction to program cost. A $150,000 annual awareness program that demonstrably reduces high-risk behavior across 3,500 employees represents a favorable risk-adjusted investment in any industry vertical. Build this calculation into your annual security budget review using your organization's actual breach cost exposure data, not industry averages.

The bottom line

Security awareness training ROI is measurable — but only if you measure the right things. Replace click rate as your primary metric with phishing report rate, credential submission rate, repeat click rate, and time to report. Design simulations to produce learning rather than to catch employees. Use just-in-time training at the moment of behavior rather than deferred compliance modules. Report program outcomes in business risk language rather than compliance activity language. Platform choice matters less than program design: a well-designed program on any of the major platforms outperforms a poorly designed program on the best platform.

Frequently asked questions

What is a good phishing click rate benchmark by industry?

KnowBe4's 2025 benchmarking report shows baseline (pre-training) click rates ranging from 9.8% in financial services to 15.4% in healthcare and 17.2% in education. After 90 days of simulated phishing and training, rates typically drop to 4 to 6% across industries. After 12 months of continuous training, mature programs achieve 2 to 3% click rates. Comparing against industry benchmarks provides useful context, but trending your own organization's rate over time is more actionable — a declining trend indicates program effectiveness regardless of where you sit relative to peers.

Should we punish employees who click phishing simulations?

Punitive consequences for phishing simulation clicks are counterproductive. Research consistently shows that fear-based security programs produce lower report rates (employees are afraid to report their own mistakes), higher cynicism about security (employees resent simulations designed to catch them rather than help them), and no better long-term click rate improvement than supportive approaches. Effective programs treat simulation clicks as learning opportunities: immediate contextual education, positive reinforcement for reporting, and targeted support for repeat clickers rather than disciplinary action. Reserve disciplinary processes for deliberate policy violations, not for clicking a well-crafted phishing email.

How do we measure security culture change, not just click rates?

Security culture measurement uses survey instruments that assess employee attitudes, knowledge, and reported behaviors across several dimensions: security ownership (do employees feel responsible for security?), security confidence (do they know what to do when facing a security decision?), reporting comfort (would they report a mistake without fear of punishment?), and threat awareness (do they recognize current attack types?). Administer a validated security culture survey annually and track longitudinal trends. SANS Security Awareness provides a free Security Culture Survey based on the Human Risk Management model. Complement survey data with behavioral metrics (report rates, time-to-report) as observable indicators of culture change.

What types of phishing simulations are most effective for training?

The most effective simulations for producing behavior change are those calibrated to slightly above the employee population's current detection ability — difficult enough to be instructive, not so difficult that failure produces helplessness rather than learning. Role-specific simulations (CFO-targeting invoice fraud for finance employees, credential harvesting via fake IT portals for general staff, fake vendor emails for procurement) produce more learning than generic simulations because the context matches employees' real threat environment. Timely simulations mimicking current active campaigns (sent within days of a widely publicized phishing campaign in the news) reinforce that security awareness training connects to real threats, not just compliance exercises.

How often should we run phishing simulations?

Monthly simulations are the minimum cadence for programs seeking measurable behavior change. Bi-weekly simulations (26 per year) produce the fastest improvement in click and report rates by increasing measurement frequency and training touchpoints. Annual or quarterly simulations produce compliance evidence but insufficient behavioral measurement to detect or respond to changes in employee risk posture. Vary simulation timing within each period — avoid predictable send times or days that employees learn to anticipate. Some platforms support randomized send time scheduling that distributes simulations throughout the month without a detectable pattern.

How do we handle executives and board members who refuse to participate in phishing simulations?

Executive refusal to participate in phishing simulations is a program risk because executives are the highest-value targets for spear-phishing and business email compromise attacks. Reframe executive participation as a personal risk briefing rather than a compliance requirement: present executives with data on executive-targeting attack rates (CEO fraud, business email compromise, and whaling attacks specifically target the C-suite), show them examples of recent executive-targeting phishing campaigns against peers in their industry, and frame simulation participation as an opportunity to understand their personal risk profile rather than a training exercise. Dedicated executive briefings on current targeting patterns, delivered by the CISO or external threat intelligence provider, are often more effective than generic simulation participation for this population.

Sources & references

  1. SANS — Security Awareness Report 2025
  2. Proofpoint — State of the Phish 2025
  3. KnowBe4 — Phishing by Industry Benchmarking Report 2025
  4. Cofense — Annual State of Phishing Report 2025
  5. NIST — Phish Scale: Rating Human Phishing Message Susceptibility

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Free Brief

The Mythos Brief is free.

AI that finds 27-year-old zero-days. What it means for your security program.

Joins Decryption Digest. Unsubscribe anytime.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Mythos Brief

Anthropic's AI finds zero-days your scanners miss.