Friday, June 27, 2025

What To Do About Repeat Clickers


I lately had a number of conversations about repeat clickers. First with a Forrester analyst after which, shortly after, at KB4-CON Orlando following a presentation on the topic by Matthew Canham, Government Director of the Cognitive Safety Institute.

After that, my method was rather less natural: intrigued by the subject, I spoke with a number of KnowBe4 clients to learn the way they handle repeat clickers. 

The time period “repeat clickers” is fairly self-explanatory: they’re the people who regularly click on on suspicious hyperlinks in emails – whether or not in phishing simulations or, extra dangerously, in precise phishing assaults. That is greater than the occasional error. Right here, we’re speaking about those self same names that incessantly come up as having interacted with simulations or brought on a safety incident. 

Repeat clickers characterize a big cybersecurity danger to their organizations. On the similar time, they’re usually amongst a number of the most valued workers. The problem, then, is how one can scale back this danger in a good and simply manner that retains these people invested of their work. 

The Disproportionate Danger and Return of Repeat Clickers

Canham’s analysis into this space is fascinating. In a pilot examine, he outlined repeat clickers as individuals who interacted with three or extra phishing simulations. He decided:

  • Whereas solely 0.83% of contributors fell into this class
  • They have been practically 10 occasions extra more likely to work together with a simulation than the broader group 

Let’s simply pause there. Repeat clickers are, usually, lower than 1% of the worker base who characterize 10 occasions the phishing danger of different workers. 

Throughout his presentation at KB4-CON, Canham additionally highlighted that these people are sometimes of serious worth to their organizations, incessantly holding high-ranking positions. He cited one instance of a recognized repeat clicker who interacted with an actual phishing assault, resulting in a cyber incident. This particular person additionally occurred to be a Nobel Prize successful scientist. 

Equally, one of many clients I spoke to (anonymously) described a regarding repeat clicker they’d had of their group: a senior worker, who’s an unbelievable asset to the corporate and who, just about, used to click on each hyperlink in each e mail – together with phishing simulations on topics completely unrelated to their position. 

It’s not simply the enterprise worth these individuals characterize. The identical analysis examine from Canham (slightly logically) states that mitigating this disproportionate danger can provide substantial return on funding (ROI). You’ve simply bought to get your repeat clickers to cease clicking.

There’s One thing Totally different About Repeat Clickers 

When anybody receives a phishing e mail (actual or simulated) sure components come into play. A few of these change on a case-by-case foundation, resembling context (e.g. somebody may be extra prone on a day after they’re speeding) or the social engineering methods used. 

Then there are steady components (issues which are much less more likely to change), which Canham lists in his analysis as cultural influences and particular person traits – with the latter described as “the first issue” in repeat clicking. 

In a later examine, Canham begins to unpack a few of these traits – and shares what’s presumably my favourite anecdote from his analysis. 

On the different finish of the spectrum from repeat clickers are a bunch labeled “protecting stewards”, who at all times determine phishing simulations and habitually report them. Canham requested each teams to recollect a code phrase of their selecting – resembling a pet’s title. In later interviews, all protecting stewards remembered their code phrases whereas all repeat clickers forgot theirs! 

Tying into this, repeat clickers additionally struggled to recall the phishing simulations they interacted with, though partly, this may be attributable to embarrassment. 

The analysis begins to exhibit the cognitive variations between the people who exhibit essentially the most fascinating cybersecurity behaviors (not interacting with simulations and reporting them) and those that repeatedly exhibit the least fascinating ones (repeated interactions that go unreported). 

Along with forgetfulness, repeat clickers additionally appear to have:

  • A extra internally oriented locus of management, that means they really feel extra answerable for their very own future
  • Excessive confidence (which I feel we will safely name “overconfidence”) of their skill to detect phishing emails 
  • A scarcity of mistrust or skepticism (making them extra prone to social engineering assaults)
  • Inflexible, slightly than adaptive, e mail habits – resembling the person talked about earlier, who clicks on hyperlinks in all emails seemingly on autopilot

It’s straightforward to see how this explosive cocktail of traits interaction to trigger somebody to repeatedly work together with phishing emails. In the end, many of those components are deeply ingrained – however they are often influenced with the appropriate approaches. 

Past Punishment: You Most likely Can’t Make Repeat Clickers Really feel Worse

Typically talking, most organizations keep away from punitive measures, seeing them as counterintuitive to a constructive cybersecurity tradition that encourages transparency for swift remediation of any potential incidents. Nevertheless, within the seek for an answer to repeat clickers, I’m certain many cybersecurity professionals have questioned whether or not some type of punishment may elicit safer behaviors. 

The reply, nonetheless, is that it received’t. Each Canham and the purchasers I spoke to broadly agree that repeat clickers already really feel unhealthy sufficient, so punishment merely received’t work as a result of it may’t make them really feel worse. 

Sensible Steps You Can Take to Scale back Repeat Clicking

So what are you able to do? Beneath are a number of totally different steps that I mentioned with our clients – all use a mix of some or all of them. 

Discuss to Your Repeat Clickers

When you’ve recognized your repeat clickers, it’s worthwhile to converse to them. These conversations must be free from any recrimination and middle on growing understanding about a person’s conduct and e mail habits. 

One Cybersecurity Supervisor I spoke to described how, in a single dialog, the worker acknowledged the chance they have been creating and acknowledged they didn’t really feel in a position to change their conduct alone. This allowed the Cybersecurity Supervisor to work alongside the person on danger discount methods that the worker was additionally invested in. 

Different clients additionally talked about internet hosting casual drop-in classes, resembling lunch and learns, and company-wide surveys about simulations. Though these actions don’t house in on repeat clickers alone, they may help foster a tradition of open communication and useful suggestions loops. 

Take a Customized Method

The analysis means that repeat clicking is pushed by particular person traits – so it is sensible {that a} customized method will assist mitigate this danger. 

Because of the evolution of AI-powered human danger administration (HRM) platforms, tailoring cybersecurity to the person is changing into simpler than ever. Whereas that is an organizationwide initiative, it offers tailor-made technical interventions and steerage in a manner that’s extremely related to every particular person. Right here, you’re not anticipating each particular person to at all times make consciously safe choices on their very own, however slightly, serving to them achieve this by means of contextual and risk-based interventions. 

Disrupt Their Behaviors

For some, repeat clicking is a behavior they’ve shaped as they use e mail – one which they need assistance breaking. One of many clients I spoke to had deployed KnowBe4 Second Likelihood to a repeat clicker who believed theirs was an ingrained conduct. Each time they clicked a hyperlink, Second Likelihood would affirm whether or not they needed to proceed to the tip vacation spot. 

The client deliberately used this for a set time frame and agreed with the worker it could be eliminated as soon as they’d altered their conduct (evidenced by means of phishing simulations). This ensured the worker didn’t develop into desensitized to Second Likelihood, that means the Cybersecurity Supervisor may put it to use once more in future (if wanted) and provided a type of ‘reward’ to the worker in the event that they have been in a position to change. 

It labored! Throughout the timeframe, the worker (who’d beforehand failed each simulation) managed to scale back their danger by over 80%. 

Facet notice: whereas this labored successfully for the repeat clicker, time-of-click URL evaluation, resembling that provided by KnowBe4 Defend, is an organization-wide method. The place URLs are deemed secure, the worker is routed on to the web site and they are often blocked fully from visiting websites with suspicious URLs – which is a a lot much less disruptive method suited to non-repeat clickers. (In fact, this may be turned off for simulations!)

Get Inventive! 

Once you converse to the people, you may discover extra distinctive methods to assist them. One buyer, for instance, had a repeat clicker with a disproportionately excessive quantity of emails. The Safety group produced an inventory that the worker reviewed after which the group unsubscribed them from any pointless emails to scale back noise within the inbox. Alternatively, you can take into account superior graymail filtering. 

One other initiative may be to run a separate coaching and simulation program tailor-made to making sure that repeat clickers are in a position to determine the best threats to your particular person group. This can require time from somebody in your group to arrange, however growing AI-driven automation inside coaching platforms will unencumber assets that you can dedicate to initiatives like this. 

Create a Constructive Atmosphere

To assist incentivize the safe behaviors, lots of our clients run annual tournaments or pit places of work/departments in opposition to one another in “Spot the Phish Leaderboards”. Prizes vary from bragging rights to the most recent tech gadget and (maybe essentially the most artistic) a main parking spot within the firm lot!

Moreover, a number of clients additionally talked about that they didn’t need remedial coaching following phishing failures to create detrimental associations with coaching normally. General, suggestions they’d was workers say the worth of simulations and coaching – they usually needed to maintain it that manner! (For extra on how workers really feel about simulations, take a look at our weblogBreaking the Stigma: 90% of Staff Agree that Phishing Simulations Enhance their Safety Consciousness.” 

In some circumstances, remedial coaching was renamed “refresher coaching” and lunch and learns had equally constructive names, with deal with “serving to” and never “imposing”. 

Behavioral Change Is Doable – However There’s No Silver Bullet 

Repeat clickers are distinctive, with their conduct pushed by particular person traits, so there’s no silver bullet that may resolve this downside. Your response must be customized. 

The purchasers I spoke with validated this, coming alongside their repeat clickers till they have been in a position to change the best way they interacted with emails to considerably lower danger. The approaches talked about right here might be transferred to your group – and, by talking together with your repeat clickers, you may give you extra!



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com