The Situation: Repeated Failure of Internal Phishing Simulations

https://securitybrief.co.nz/uploads/story/2025/07/18/preview_realistic-office-worker-opening-suspicious-internal-email-at-desk-cautiously.webp

Phishing simulations are a standard defensive control used by organisations to measure human vulnerability to cyber attacks. They help determine whether staff can recognise social-engineering threats before a real attacker exploits them.

If a particular employee repeatedly clicks simulated phishing emails despite training, it represents a behavioural security risk that must be addressed systematically.

The aim is risk reduction, not punishment.

However, ignoring repeated warnings eventually becomes a policy compliance issue.


Step 1: Verify the Simulation Results

Confirm the Failure Data

Before escalating anything, check the details of the employee’s results.

Review:

  • number of phishing simulations sent
  • number of times the employee clicked
  • whether credentials were entered
  • whether the email was reported

This ensures the issue is genuine repeated behaviour, not a single mistake.

Assess the Difficulty Level of the Simulations

Some phishing simulations are intentionally very convincing.

Ask:

  • Were the emails unusually difficult to identify?
  • Did many other employees fail the same simulation?

If failure rates across the organisation were high, the issue may be training design rather than individual behaviour.


Step 2: Conduct a One-to-One Security Discussion

Arrange a private meeting with the employee.

The conversation should focus on education rather than blame.

Explain:

  • why phishing simulations are used
  • what behaviour was observed
  • the potential consequences of a real attack
Explain Real-World Risks

Employees often underestimate phishing risks.

Clarify what a real click could cause:

  • ransomware infection
  • compromised company accounts
  • financial fraud
  • data breaches

Even a single compromised account can give attackers a foothold into the wider network.


Step 3: Provide Targeted Remedial Training

Assign Focused Phishing Awareness Training

Instead of repeating general cyber training, provide specific phishing recognition training.

Examples include:

  • short interactive modules
  • simulated email analysis exercises
  • real phishing case studies

Employees who repeatedly fail simulations often benefit from hands-on examples rather than theory.

Teach Practical Detection Techniques

Staff should learn to check:

  • sender email addresses carefully
  • unexpected attachments
  • urgent requests for credentials or payments
  • links that do not match the domain

Teaching employees to pause before clicking is one of the most effective behavioural controls.


Step 4: Increase Monitoring and Simulation Frequency

https://media.licdn.com/dms/image/v2/C4D12AQETnFUwdt7XXw/article-cover_image-shrink_600_2000/article-cover_image-shrink_600_2000/0/1588737695532?e=2147483647&t=Co1NlyGtv5GRtuz00Dq9-z0FBn78C8JyDMbSWu0Ds04&v=beta

If behaviour does not improve after training, introduce additional monitoring.

Possible measures include:

  • targeted phishing simulations for the employee
  • monitoring for suspicious login behaviour
  • alerts on unusual account activity

If the employee has privileged access, consider temporarily reducing high-risk permissions.

The goal is to prevent the account becoming an attack entry point.


Step 5: Escalate Through Management and HR

If the employee continues ignoring cyber security protocols, escalation becomes necessary.

Work with:

  • the employee’s line manager
  • the Human Resources department
  • the organisation’s compliance team

Ensure everything is fully documented:

  • training completed
  • number of failed simulations
  • discussions with the employee

In many organisations, repeated failure to follow security policies may be considered negligence or misconduct.


Step 6: Implement Technical Safeguards

https://www.techworx.io/images/easyblog_articles/122/overview-login.png

Cyber security cannot rely solely on human behaviour.

Technical defences should reduce the likelihood of phishing success.

Recommended protections include:

  • Multi-Factor Authentication (MFA) for all accounts
  • advanced email filtering and phishing detection
  • link rewriting and scanning systems
  • domain spoofing protection (DMARC, SPF and DKIM)

These controls ensure that even if an employee clicks a malicious link, attackers still struggle to gain access.


Step 7: Review the Organisation’s Security Culture

Sometimes repeated phishing failures reflect broader organisational issues.

Ask whether:

  • employees feel pressured to respond quickly to emails
  • reporting suspicious emails is encouraged
  • staff understand the importance of cyber security

Organisations with strong cyber culture typically see:

  • higher phishing reporting rates
  • fewer successful attacks
  • faster incident detection

Recommended Response Strategy

A balanced approach should follow this sequence:

  1. Verify simulation results and confirm repeated behaviour.
  2. Conduct a supportive one-to-one discussion.
  3. Provide targeted remedial training.
  4. Increase monitoring and targeted simulations.
  5. Escalate through HR if behaviour does not improve.
  6. Strengthen technical controls to reduce risk.
  7. Evaluate wider security awareness culture.

Final Reality Check

Cyber security professionals love fancy tools and threat intelligence dashboards, but the uncomfortable truth is this:

Most breaches still start with someone clicking an email they shouldn’t.

Handling repeated phishing failures properly is therefore not just training—it’s protecting the entire organisation from compromise.

Leave a Reply

Your email address will not be published. Required fields are marked *