IT
Phishing Campaign Results: How Did We Do?
Our latest phishing simulation has wrapped up, and here’s how things went: out of 149 recipients who opened the email, 63 clicked the link, but only 28 reported it as suspicious.
These numbers serve as a reminder that it only takes one successful phishing attempt for an attacker to gain initial access to our systems. From there, they can move laterally, escalate privileges, and potentially access sensitive data or disrupt business operations.
Below, we’ll break down the red flags in the simulated email to help you spot threats more effectively in the future.
Campaign Details
300
250
200
149
90
100
63
28
2
0
5
0
0
Sent
No Response
Email Opened
Phishing Link Clicked
Phishing Link Tester
Vulnerable Multiclicked Reported Bounced
When you receive an unsolicited email with embedded web links, keep these tips in mind: • Be immediately suspicious if the message tries to scare you, offers an incredible deal, or prompts you to reset a password or update account information. • Check each link by hovering over it to see its true source. If the URL is unfamiliar or differs from what you expected to see, don’t click. • Verify claims and offers via a trusted website or known phone number. • Ask your IT department for advice if you’re unsure.
Made with FlippingBook - professional solution for displaying marketing and sales documents online