This document explains how CyberHoot AttackPhish populates the various tracking fields when running phishing simulations. It defines the user actions that trigger each status and describes when additional training is assigned.
Email Sent
Email Opened
Clicked Link
Submitted Data
CyberHoot automatically assigns remedial training when users demonstrate risky behavior:
Simply opening the email does not trigger training, since users may preview messages in the normal course of work.
Training is assigned as a short, targeted awareness assignment, reinforcing how to spot phishing attempts and reminding users not to click or submit information.
Metrics may underreport “opens” if users block image loading in their mail client.
Clicking a link is the most reliable indicator of risky behavior, since it requires an intentional user action.
Submitted data represents the most severe failure point and is treated as a critical incident for awareness training.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...
Read more
Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...
Read more
Phishing emails used to be easy to spot. Bad grammar. Weird links. Obvious scams. Those days are...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
