Phishy
Research· 7 min read

Why “Gotcha” Phishing Training Backfires

Research shows that shame-based phishing tests increase employee anxiety without improving security behaviour. Here’s what the evidence says — and what actually works.

The standard approach

Most phishing simulation programmes follow the same script: send a fake phishing email to all staff, collect click data, then immediately confront clickers with a message like “You’ve been phished! Complete this mandatory training module.”

Security teams often share department-level click rates in all-staff meetings. Some organisations send follow-up emails from the CISO calling out behaviour. The assumption is that embarrassment creates motivation.

The research says otherwise.

What the research shows

A 2022 study published in the Journal of Cybersecurity (Lain et al.) followed 14,000 employees across a large organisation running a phishing simulation programme. Key findings:

  • Employees who received immediate negative feedback after clicking showed higher security anxiety scores — but their click rates did not decrease faster than those who received neutral educational feedback.
  • More critically, high-anxiety employees were less likely to report suspicious emails to the security team — fearing blame if it turned out to be legitimate.
  • Employees who clicked repeatedly were often in high-workload roles, not security-unaware ones. The correlation between workload and click rate was stronger than between security knowledge and click rate.

A separate study from ETH Zurich (2021) found that embedded phishing training (the “teachable moment” shown immediately after clicking) was significantly more effective than separate mandatory training modules — but only when framed as helpful rather than punitive.

Why shame-based training backfires

The mechanism is straightforward: shame creates avoidance behaviour. When clicking a phishing link means public embarrassment, employees learn one thing — hide the fact that they clicked.

This creates a dangerous gap:

  • Employees who accidentally click a real phishing link are less likely to report it
  • Employees who receive a suspicious email are less likely to report it (fear of false positives being embarrassing)
  • Security culture shifts from “help us stay safe” to “don’t get caught”

What actually works

The research points to three components that consistently reduce click rates over time:

1. Immediate, contextual coaching

When an employee clicks a simulated phishing link, show them immediately — on that same page — what the red flags were. Not a generic “you’ve been phished” message, but specific coaching: “Notice the sender domain was support@company-uk.net, not @company.com. Here’s how to spot this in future.”

2. Progressive difficulty

Start with obvious scenarios and increase difficulty as employees improve. Hitting someone with a spear-phishing simulation in their first test is demoralising and doesn’t teach anything. Build confidence before complexity.

3. Report-rate focus over click-rate focus

The metric that matters most for your actual security posture is how fast employees report suspicious emails. An organisation where 60% of employees click simulated phishing but 80% subsequently report it is in much better shape than one with 20% click rates and near-zero reporting.

How Phishy is built differently

Phishy is designed around these principles. When an employee clicks a simulated link, they see a personalised coaching overlay — not a punishment screen. The coaching adapts to the specific lure used and the employee’s role.

Reporting rates are tracked alongside click rates, and the dashboard shows per-employee improvement trends — not just aggregate statistics that obscure who needs help.

Run simulations that teach, not shame

14-day free trial. No credit card. Built on what the research says actually works.

Start free trial →