Skip to content
English
  • There are no suggestions because the search field is empty.

Phishing Simulator Executive Reports

Executive Reports help admins create high-level reports on human risk stats, offering insights into phishing and training efforts. These reports benefit managers and executives by summarizing the organization's security posture and risks.


- Report Types
- Phishing Dwell Time Distribution
- Users with Highest Risk Scores
- Industry Phishing Risk Score
- Departments with Highest Risk Scores
- Simulation Coverage
- Repeat Offenders Users (Threshold: 2)
- Companies with Highest Risk Scores
- Impact of Phishing Awareness Training
- Users' Time to Failure
- Phishing Report Rates Over Time
- Total Reported Suspicious Emails and %age
- Incident Distribution Among Employees
- How to create Executive Reports
- How to download Executive Reports
- How to schedule Executive Reports
- How to edit or delete Executive Reports

Report Types

Phishing Dwell Time Distribution

The "Phishing Dwell Time Distribution" graph shows how long users engage with phishing simulation emails before responding, reporting, or falling victim. The X-axis displays dwell time in minutes (0 to 120), while the Y-axis represents the percentage of users. Most users engage for less than 10 minutes, with fewer taking longer. The orange line marks the average dwell time of 25 minutes, indicating that, on average, users take this long to respond.


This graph helps assess an organization's vulnerability to phishing attacks by showing how quickly employees detect phishing attempts. If most users respond in under 25 minutes, it suggests good awareness, while longer times may indicate greater risk, requiring targeted training. Organizations can use this data to improve security awareness programs by focusing on users who take more time.

The graph's primary benefit is providing data-driven insights into employee susceptibility, allowing for personalized training. It also tracks improvement over time, helping organizations measure the effectiveness of their security initiatives and promoting a more security-conscious culture.

Users with Highest Risk Scores

This graphic displays the human risk score for users who are considered at the highest risk within your organization. The horizontal bars represent individual users, with their corresponding risk scores as percentages. The red bars indicate that these users have reached a critical risk level, suggesting that immediate training is necessary to mitigate their risk.

This chart is important because it identifies specific individuals within your organization who are at the greatest risk of falling for phishing attempts. By highlighting these high-risk users, the chart allows you to prioritize training and intervention efforts where they are most needed. The goal is to reduce their risk scores and ensure that they are better equipped to recognize and avoid security threats.

Understanding this graphic helps your organization take targeted actions to improve overall security. By focusing on users with the highest risk scores, you can deliver tailored training and support to those who need it most, reducing the likelihood of successful phishing attacks and other security incidents.

The benefit of using this graphic is that it provides a clear and actionable overview of where your organization’s vulnerabilities lie, enabling you to take proactive measures to protect your company from potential threats.

Industry Phishing Risk Score

This graphic shows a comparison between your company's phishing risk score and an industry average. The graph displays how user responses and report rates from phishing simulations compare against this industry benchmark. The blue dashed line represents the industry average phishing risk score, while the orange line shows your company's phishing risk score for each campaign. The red bars indicate specific metrics related to phishing simulations, such as how many users were targeted and how many reported the phishing attempt.

This chart is important because it provides insights into how well your company is performing in phishing simulations compared to the industry standard. A higher risk score above the industry average suggests that your users are more susceptible to phishing attacks, which might indicate a need for enhanced training or additional security measures. Conversely, a lower risk score means that your company's phishing defenses are stronger than those of the average company in your industry.

Understanding this graphic helps your organization identify areas where improvements are needed, such as increasing user awareness or refining phishing simulation strategies. By tracking these metrics over time, you can monitor the effectiveness of your security awareness programs and adjust them as necessary to reduce the risk of successful phishing attacks.

The benefit of using this graphic is that it allows you to benchmark your company's phishing risk against industry standards, providing a clear view of where you stand and what actions might be needed to enhance your overall security posture.

This graphic displays the human risk score for users who are considered at the highest risk within your organization. The horizontal bars represent individual users, with their corresponding risk scores shown as percentages. The red bars indicate that these users have reached a critical risk level, suggesting that immediate training is necessary to mitigate their risk.

Departments with Highest Risk Scores

This graphic shows the human risk scores for various departments within your organization, highlighting those that are considered at the highest risk. Each bar represents a different department, with the length of the bar indicating the department’s risk score as a percentage. The red bars signal that these departments have reached a critical risk level, suggesting that immediate training is necessary to mitigate their risk.

This chart is important because it identifies specific departments within your organization that are most vulnerable to security threats, such as phishing. By pinpointing these high-risk departments, the chart allows you to prioritize training and intervention efforts where they are most needed, ensuring that these departments receive the attention required to lower their risk levels.

Understanding this graphic helps your organization take targeted actions to improve overall security. By focusing on departments with the highest risk scores, you can deliver tailored training and support, thereby reducing the likelihood of successful security breaches originating from these areas.

The benefit of using this graphic is that it provides a clear and actionable overview of where your organization’s vulnerabilities lie, enabling you to take proactive measures to protect your company from potential threats.

Simulation Coverage

This graphic displays the proportion of users who have been included in phishing simulations versus those who have not. It can be a pie chart or a bar chart, both illustrating the same data. The small blue section represents the simulated users, while the large yellow section represents the non-simulated users.

This chart is important because it highlights the extent of coverage your phishing simulation program has within your organization.

The benefit of using this graphic is that it provides a clear visual representation of how many users are being actively engaged in your phishing simulation efforts. It helps you make informed decisions about scaling up your simulation program to improve overall organizational readiness against phishing attacks.

Repeat Offenders Users (Threshold: 2)

This graphic shows the percentage of users who have repeatedly fallen for phishing simulations, defined here as having failed at least twice. It can be in different visualizations—a stacked bar chart and a pie chart—that represent the same data. The red portion represents repeat offenders, while the blue portion shows all simulated users.

This chart is important because it highlights a specific group of users within your organization who are at higher risk due to their repeated failure to recognize phishing attempts. The small percentage of repeat offenders compared to the total number of simulated users indicates how many individuals might require additional training or intervention to improve their ability to detect phishing threats.

Understanding this graphic helps your organization identify users who may need more focused attention in your security awareness training programs. By isolating those who have repeatedly fallen for phishing simulations, you can provide them with additional resources or personalized training to help reduce their susceptibility to phishing attacks.

The benefit of using this graphic is that it offers a clear and focused view of the most vulnerable users in your organization.

Companies with Highest Risk Scores

This graphic displays the human risk scores for various companies, highlighting those with the highest risk levels. Each bar represents a different company, with the length of the bar indicating the company's risk score as a percentage. The red bars signify that these companies have reached a critical risk level, suggesting that immediate training is necessary to mitigate their risk.

This chart is important because it identifies specific companies that are most vulnerable to security threats. High-risk scores indicate that these companies are at greater risk of falling victim to phishing attacks or other cybersecurity threats. By pinpointing these high-risk companies, the chart allows for the prioritization of training and intervention efforts to reduce their risk levels.

Understanding this graphic helps organizations take targeted actions to improve overall security. By focusing on companies with the highest risk scores, you can deliver tailored training and support to help these organizations better recognize and respond to security threats.

The benefit of using this graphic is that it provides a clear and actionable overview of where vulnerabilities lie across different companies, enabling you to take proactive measures to protect these organizations from potential threats.

Impact of Phishing Awareness Training

This graphic demonstrates how phishing risk scores have evolved over time within your organization following a 12-month cybersecurity training program. The vertical axis represents the phishing risk score, while the horizontal axis tracks the score across various months. The dashed blue line indicates the industry average phishing risk score, serving as a benchmark to compare your company's performance.

The bars in the chart are color-coded to show different levels of risk over time. Red bars represent higher risk scores at the start of the training, yellow bars indicate moderate risk, and green bars signify lower risk as the training progresses. The chart also provides average risk scores for different three-month intervals, allowing you to see the overall trend in your organization's phishing risk.

This chart is important because it visually illustrates the effectiveness of your phishing awareness training. The downward trend from red to green bars suggests that the training program has successfully reduced the organization’s phishing risk over time. The closer your company's risk score gets to or falls below the industry average, the more effective the training program has been.

Understanding this graphic allows you to assess the long-term impact of your security awareness initiatives. If the chart shows a consistent decrease in risk, it validates the training's effectiveness. However, if the risk remains high or increases, it may indicate that the training needs to be adjusted or reinforced.

The benefit of using this graphic is that it provides a clear and comprehensive overview of your organization’s progress in reducing phishing risk. It helps you make informed decisions about future training strategies and ensures that your organization remains vigilant against phishing threats.

Users' Time to Failure

This presents the average response times of users who clicked on phishing links and submitted data during phishing simulations. The horizontal axis shows the number of users, while the vertical axis represents the time to respond in seconds. The bars are divided into two segments: the lighter red section indicates users who clicked on the phishing link, and the darker red section represents those who also submitted data.

The chart also includes two important benchmark lines. The blue dashed line shows the company’s average response time for link clicks and data submission, while the yellow dashed line represents the industry average. The position of these lines relative to the bars provides insight into how quickly your users are being phished compared to the industry average.

This chart is important because it highlights how quickly users are falling for phishing attempts, both in terms of clicking the link and submitting sensitive information. A shorter time to failure indicates that users are being phished more quickly, which may suggest a need for stronger or more frequent training. Conversely, if users are taking longer to click or submit data, it could indicate improved awareness and caution.

The benefit of using this graphic is that it provides a clear visual representation of user behavior during phishing simulations, helping you identify vulnerabilities and make informed decisions to improve your organization’s overall security posture. By addressing these issues, you can reduce the likelihood of users falling for phishing attempts in the future.

Phishing Report Rates Over Time

This graphic tracks the reporting rates from phishing simulations, comparing users who clicked on phishing links with those who did not over a three-month period. The vertical axis represents the phishing report rate, while the horizontal axis shows different months of the year.

The stacked bar chart is divided into three segments: the green section represents users who did not click on the phishing link but reported the phishing attempt, the red section indicates users who clicked on the phishing link, and the gray section shows users who did not report the phishing attempt at all.

This chart is important because it provides a clear view of how user behavior and reporting practices have changed over time. For example, a higher percentage of gray indicates a larger number of users who failed to report phishing attempts, which could signal the need for additional training or awareness campaigns. Conversely, if the green segment grows over time, it shows that more users are correctly identifying and reporting phishing simulations, reflecting an improvement in security awareness.

Understanding this graphic allows your organization to monitor the effectiveness of your phishing simulation training and to identify trends in user behavior. If reporting practices have improved over time, as suggested by an increase in the green and red segments, it indicates that users are becoming more vigilant. However, a decrease in reporting, as indicated by a rise in the gray segment, would suggest the need for further intervention.

The benefit of using this graphic is that it provides a clear, time-based overview of how well your users are responding to phishing simulations. This information helps you identify areas where additional training might be needed and allows you to track the impact of your efforts to improve security awareness over time.

Total Reported Suspicious Emails and Percentage

These graphic presents the reporting rates of suspicious emails across different categories. It can be a bar chart, or a pie chart that display the same data. The categories include "Undetected," "Malicious," "Phishing," and "Simulation."

This chart is important because it provides a clear overview of how well users are identifying and reporting different types of suspicious emails. The higher reporting rates for phishing and simulation emails suggest that users are generally aware and responsive to potential threats. However, the presence of undetected emails highlights a potential area for improvement in user awareness or training.

The benefit of using these graphics is that they provide actionable insights into user behavior regarding email security, allowing you to target training efforts more effectively and improve the overall security posture of your organization.

Incident Distribution Among Employees

This graphic demonstrates how a small percentage of employees are responsible for the majority of security incidents within an organization. The graph uses total percentages to highlight the disproportionate distribution of incidents. It shows the percentages of incidents caused by employees, represented by the intersection of the gold and red lines. The blue line represents the total incidents, indicating how incidents accumulate as more employees are considered.

This visualization is significant for identifying high-risk individuals within the organization, allowing for targeted training and interventions to reduce overall security risks. By understanding the data presented in this graph, you can allocate resources more effectively, focusing efforts on the small group of employees who contribute most to security incidents.

How to Create Executive Reports

  •  Log in to the platform.
  •  Go to the Advanced Report menu on the left-hand side of the dashboard.
  •  Select Executive Reports from the dropdown.
  •  In the Executive Reports section, click on the + NEW button to create a new report.
  •  Fill in report details:
    •  Report Name: Enter a name for your report.
    •  Company Name: Specify the name of your company.
    •  Date Range: Select the date range for the statistics you want to include in the report.
  •  Include various statistics about human risks within your organization from the left-hand menu under the Phishing Metrics or Training Metrics category, such as:
    •  Phishing Risk Score Across Industries
    •  Phishing Simulation Engagement and Reporting Trends
    •  Users with Highest Risk Scores
    •  Industry Phishing Risk Score
    •  Departments with Highest Risk Scores
    •  Repeat Offender Users
    •  Impact of Phishing Awareness Training
    •  Training Completion
  •  Preview and Save the Report:

    •  Cancel: If you want to cancel the report creation, click the Cancel button.
    •  Save Report: To save the report, click the Save Report button.
    •  Preview PDF: To preview the report as a PDF in your browser, click the Preview PDF button.

How to Download Executive Reports

Go to the Advanced Report > Executive Reports menu and then click on the Download button on the right-hand side for your preferred report. The report will be downloaded in PDF format in a minute.


How to Schedule Executive Reports

Go to the Advanced Report > Executive Reports menu and then click on the Schedule Report button on the right-hand side for your preferred report. Another option is to Edit the report and schedule the report by clicking on the Schedule button.

For more information on the Schedule Report feature, please click here.


How to Edit or Delete Executive Reports

Go to the Advanced Report > Executive Reports menu and then click on the Delete button to delete the preferred report. To Edit the report, please click on the Edit button.