How Do You Prove Security Awareness Is Working?

Your guide to which behavioral metrics (reporting rate, time-to-report, miss rate, and repeat clickers) actually show if your program is improving human cyber resilience.

Post hero image

Table of contents

See Hoxhunt in action
Drastically improve your security awareness & phishing training metrics while automating the training lifecycle.
Get a Demo
Updated
March 9, 2026
Written by
Fact checked by

Security awareness programs are easy to run… but they’re much harder to prove are working.

Training completion rates and phishing click rates show activity but they don’t answer the question leadership actually cares about: Is this program reducing human risk?

To prove that security awareness is working, you need to look at a different set of signals - metrics that show how people behave when a suspicious message lands in their inbox.

Why fail rate is an incomplete security awareness metric

Phishing fail rate became the default metric for awareness programs because it’s easy to understand and easy to report.

But measuring security awareness purely through click rates creates a distorted picture of risk. It focuses on isolated mistakes instead of how people actually behave when they encounter suspicious messages

1. It measures mistakes, not defense

Fail rate answers one narrow question: Did someone click the simulated attack? But what you really want to find out is whether employees detect and report threats.

Reporting is far more valuable operationally. When an employee reports a phishing email, they help security teams detect threats earlier and protect others.

High performing awareness programs track defensive behavior, not just failures.

2. It hides disengaged users

Fail rate usually classifies people into two groups:

  • Clicked the phishing email
  • Reported the phishing email

But there’s a third group that often gets ignored: users who do nothing.

They might delete the email, ignore it, or miss it entirely.

From a risk perspective, this group is important because their behavior is unknown. If the message had been a real attack, would they report it? Ignore it? Click later on mobile?

Fail rate doesn’t capture this risk at all.

3. It can be easily gamed

Fail rate can also be unintentionally manipulated depending on how simulations are designed.

For example, you can lower fail rate by sending:

  • Obvious phishing emails
  • Predictable templates
  • Unrealistic attacks
  • Overly simple simulations

This makes the metric look better without improving real-world resilience.

4. Real attackers don’t care about your metric

Attackers don’t send “training-style” phishing emails.

They send realistic attacks like:

  • Vendor invoice fraud
  • Credential harvesting pages
  • Executive impersonation messages
  • Multi-channel attacks via Teams, Slack, SMS, or WhatsApp

Programs optimized around fail rate often train employees to recognize templates, not real attacks. This is why many teams see a frustrating pattern: training metrics improve, but incidents don’t decrease.

Measure defensive behavior, not just failure

Instead of asking: “Who clicked?”

More mature programs ask: “Who detected and reported the threat?”

That shift leads to a better set of metrics, including:

  • Reporting rate
  • Time-to-report
  • Miss rate
  • Repeat clicker reduction

These metrics show whether employees are actually becoming part of the organization’s defense.

Which security awareness metrics actually show behavior change?

So if we’re moving beyond fail rate, what should you measure instead?

Most awareness programs track a lot of activity metrics:

  • Training completion
  • Course scores
  • Number of simulations sent

These metrics show that a program is running, but they don’t show whether risk is changing.

Security leaders are now shifting to behavior metrics. These capture what employees actually do when they encounter a suspicious message.

Activity metrics (prove the program ran) Behavior metrics (prove people changed)
  • Training completion
  • Quiz scores
  • Campaign participation
  • Number of simulations sent
  • Reporting rate (did they raise the alarm?)
  • Time-to-report (how fast did the alarm travel?)
  • Miss rate (who is disengaged / invisible?)
  • Repeat clicker reduction (is concentrated risk shrinking?)

Why behavioral metrics matter operationally

Behavioral metrics are useful because they map directly to real attack outcomes.

For example:

  • Reporting rate → determines how often threats are surfaced to security teams
  • Time-to-report → determines how quickly incidents can be contained
  • Miss rate → reveals disengaged users who may ignore attacks
  • Repeat clickers → identifies concentrated risk among a small group of users

Instead of looking at isolated campaign results, these metrics show how the human detection layer is performing.

And that’s the real goal of security awareness. Not just training people to avoid mistakes but turning employees into an early warning system for attacks.

Reporting rate: proof employees detect threats

If you only track clicks, you’re measuring the moment someone makes your life harder. Reporting rate measures the moment an employee makes your life easier.

This is why practitioners keep coming back to it - phishing is the one thing employees react to, and reporting is the one behavior that actually changes outcomes.

What “reporting rate” actually means

  • Simulation reporting rate = % of simulated phish that get reported
  • Real-threat reporting rate = % of suspicious real emails employees report (even if some are false positives)

Both matter, but they answer different questions:

  • Simulation reporting rate = are they learning the reflex?
  • Real-threat reporting rate = are they using the reflex in the wild?

Why leadership understands reporting rate instantly

Because it’s easy to translate:

  • Higher reporting rate = more early detection
  • More early detection = less dwell time
  • Less dwell time = less blast radius

Even non-security execs get this. You’re effectively showing: “Our people are helping surface threats earlier than our tooling would alone.”

The hidden reason reporting rate is so powerful: it scales defense

When one person reports quickly, you can often protect many:

  • Security investigates faster
  • You warn the business faster
  • You pull similar messages faster
  • You reduce the chance the next person clicks

This is also why “be vigilant” reminders don’t move the needle… people need a simple, repeatable action. Reporting is that action.

How employees become an early detection system

What can distort reporting rate (things to avoid)

  • Too many reporting buttons → users don’t know where to click, so reporting stays low even if awareness is improving
  • No feedback loop → users report, then hear nothing, so the behavior doesn’t stick (people want to know if they did the right thing)
  • Punitive tone → users fear being wrong, so they stop reporting (or only report when they’re 100% sure)

If reporting is low, don’t assume “users don’t care.” Often the system is accidentally training them not to report.

Two practical ways to increase reporting rate without more training

  1. Make reporting a single reflex: One obvious button. One place. One consistent message: “If unsure, report.”
  2. Reward reporting, don’t just punish clicking: If the culture feels like “gotcha,” people hide. If the culture feels like “thanks,” people report.

Time-to-report: how quickly threats reach security

Reporting rate tells you whether employees report threats…

Time-to-report tells you how fast those signals reach the security team.

In real attacks, speed matters. The difference between a report in 60 seconds vs 6 hours can determine whether a phishing campaign becomes a contained incident or a widespread compromise.

Why speed matters in phishing detection

Phishing attacks typically target many employees at once.

If one person reports quickly, you can:

  • Investigate the message
  • Search for similar emails across mailboxes
  • Remove malicious emails automatically
  • Warn the rest of the organization

In effect, the first report can protect everyone else. That’s why fast reporting dramatically reduces the impact of phishing campaigns.

Why reporting speed matters

What good time-to-report looks like

Most organizations track median reporting time rather than averages to avoid outliers skewing the data.

A strong program usually shows a clear pattern:

  • New users report slowly
  • Trained users report faster over time
  • Experienced users report almost immediately

Some organizations even track the fastest reporters, since those individuals effectively act as an early detection network.

With Hoxhunt, for example, the median reporting time for a real threat is 25 minutes. The fastest 10% of Hoxhunt users report within 55 seconds, and the fastest 5% in as little as 39 seconds, effectively acting as an early detection network.

Why time-to-report improves with habit, not knowledge

Training people to recognize phishing is useful. But reducing reporting time usually comes from habit formation.

Employees develop a simple reflex: something looks off → report it.

Frequent exposure to realistic simulations helps build that reflex over time, which is why continuous micro-training and regular simulations are far more effective than occasional awareness sessions.

How to improve time-to-report

Security teams typically see faster reporting when they:

  • Make reporting frictionless (one button, one action)
  • Give immediate feedback so employees know reporting helped
  • Normalize false positives so people don’t hesitate to report

When employees feel confident reporting (even if they might be wrong) reporting speed improves dramatically.

Miss rate: the hidden risk most programs overlook

Miss rate tracks the proportion of phishing simulations that receive no interaction at all.

  • The employee didn’t click
  • The employee didn’t report
  • The security team never saw the message

That creates invisible risk. If a real phishing attack followed the same path, your organization might never detect it early.

Why miss rate matters for awareness programs

If employees regularly ignore suspicious emails, it usually signals a deeper issue with the program.

Common causes include:

  • Employees don’t know where or how to report
  • Reporting feels unclear or inconvenient
  • Users believe reporting creates extra work
  • Employees assume someone else will report it

When reporting paths are confusing, people default to ignoring messages instead of engaging with them.

What miss rate tells you that other metrics don’t

Fail rate tells you who clicked. Reporting rate tells you who reported. Miss rate tells you whether employees are actively participating in threat detection at all.

When miss rate decreases over time, it usually means employees are starting to actually notice suspicious messages and take action by reporting. In other words, it’s often a signal that the security reflex is forming.

How mature programs reduce miss rate

Teams that reduce miss rate typically focus on making the response simple and habitual:

  • One clear reporting button
  • Fast feedback when users report
  • Positive reinforcement for reporting

The goal isn’t just avoiding clicks. It’s building a culture where suspicious messages trigger a consistent response.

Repeat clickers: where most human risk concentrates

One of the most surprising patterns security teams discover is that phishing risk is not evenly distributed across employees.

Instead, it tends to concentrate.

In many organizations:

  • A small group of users fails repeatedly
  • The majority rarely click at all
  • Overall averages hide this imbalance

This is why looking only at overall click rate can be misleading. Two organizations might both report a 5% click rate, but their risk profile could look completely different.

Distributed vs Concentrated Risk

In many organizations, a small group of users repeatedly interacts with phishing emails, while most employees rarely click at all. When failures concentrate in the same individuals, the organization’s exposure is very different than when clicks are evenly distributed. Only the second scenario represents systemic exposure.

Why repeat clickers need addressing

Repeat clickers matter because they often represent persistent exposure to social engineering attacks.

If attackers send multiple phishing campaigns over time, these users are statistically more likely to interact with them.

From a security standpoint, that means:

  • Attackers may repeatedly target the same individuals
  • A single compromised account could become an entry point
  • Overall program averages may look healthy while risk persists

This is why mature awareness programs track repeat clicker reduction over time, not just overall failure rates.

The goal isn’t to shame individuals but to understand whether the program is reducing concentrated human risk.

How to build a defensible security awareness metric narrative

At some point, every security leader gets the same question: “Is this program actually making us safer?”

Answering that question with a single metric rarely works. What leadership actually needs is a narrative supported by multiple signals.

Start with a simple behavioral framework

A clear way to explain awareness effectiveness is to show how employee behavior improves across four dimensions:

Employee behavior Metric to track What the metric reveals
Detecting suspicious messages Reporting rate Shows how often employees surface potential threats to the security team.
Detecting threats quickly Time-to-report Indicates how fast employees escalate suspicious messages, reducing attacker dwell time.
Engaging with threats instead of ignoring them Miss rate Reveals whether employees are actively participating in threat detection or ignoring suspicious messages.
Reducing concentrated human risk Repeat clicker reduction Shows whether a small group of high-risk users is becoming more resilient over time.

Each metric answers a different question about how employees respond to threats. Together, they show whether the human detection layer is improving.

Focus on trends, not snapshots

One common mistake is presenting awareness metrics as a single number.

What leadership cares about is direction:

  • Is reporting increasing over time?
  • Are employees reporting faster?
  • Are repeat failures decreasing?

Trends demonstrate that the program is changing behavior, not just generating data.

Connect the metrics to real security outcomes

The final step is translating awareness metrics into something leadership already understands - which is risk reduction.

For example:

  • Higher reporting rate → more threats surfaced early
  • Faster reporting → shorter attacker dwell time
  • Lower miss rate → stronger employee engagement
  • Fewer repeat clickers → less concentrated exposure

Taken together, these signals show that employees are becoming active participants in detection, not passive training recipients.

That shift from awareness activity to measurable defensive behavior is what ultimately proves a program is working.

How you know your awareness program is actually making you safer

You’ll know your security awareness training is working when employees stop being passive recipients of training and start acting as part of your detection layer.

You can usually see the shift in the metrics:

  • More employees report suspicious messages
  • Threats are reported faster
  • Fewer emails are ignored
  • The same users stop failing repeatedly

Individually, these signals are useful. Together, they tell a clear story that employees are helping detect attacks earlier.

That is the real objective of security awareness.

Not eliminating every click or achieving perfect simulation scores, but creating an environment where suspicious activity is surfaced quickly and consistently.

In the real world, attacks don’t fail because no one clicks. They fail because someone notices and reports them before damage is done.

When that becomes the normal behavior inside an organization, security awareness isn’t just “working.” It’s actively reducing human risk.

Next questions security leaders ask about security awareness

Want to learn more?
Be sure to check out these articles recommended by the author:
Get more cybersecurity insights like this