This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing simulations. It defines the user actions that trigger each status and describes when additional training is assigned.
Email Sent
Email Opened
Clicked Link
Submitted Data
CyberHoot automatically assigns remedial training when users demonstrate risky behavior:
Simply opening the email does not trigger training, since users may preview messages in the normal course of work.
Training is assigned as a short, targeted awareness assignment, reinforcing how to spot phishing attempts and reminding users not to click or submit information.
Metrics may underreport “opens” if users block image loading in their mail client.
Clicking a link is the most reliable indicator of risky behavior, since it requires an intentional user action.
Submitted data represents the most severe failure point and is treated as a critical incident for awareness training.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
A Practical Brief for vCISOs THE WARNING WE IGNORED OR COULD NOT UNDERSTAND For years, the most credible...
Read more
A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...
Read more
Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
