Skip to content
  • There are no suggestions because the search field is empty.

False Clicks in Wizer Phishing Simulation Emails

What Are False Clicks?

A false click occurs when a phishing simulation email is marked as “clicked” even though the user did not intentionally click a link. This typically happens due to email security tools, email client features, or improper handling of the simulated email.

False clicks are not caused by Wizer. They result from how email systems (e.g., Microsoft Outlook, Google Workspace, or security gateways) scan, rewrite, preview, or forward emails before or after delivery.


How to Fix and Prevent False Clicks

Follow the steps below to reduce or eliminate false clicks in phishing simulations.

1. Use DED (Direct Email Delivery)

Enable DED) to bypass email security filters that may automatically scan or click links. This is the most effective way to prevent false positives.

Set up Direct Email Delivery (DED):


2. Review the Phishing Simulation Checklist

Go through the Wizer Phishing Simulation Checklist to ensure your email environment and security tools are properly configured for simulations.


3. Ensure Proper User Handling of Simulation Emails

Users must handle phishing simulation emails correctly:

  • Use the Wizer “Report Phishing” button

  • Do not use the built-in Gmail or Outlook “Report Phishing” option

  • Do not forward the email to IT or other users

Improper handling can trigger automated scans that register as clicks.


4. Outlook Users: Disable Link Preview (Temporarily)

If you use Microsoft Outlook, ensure link preview is disabled for the duration of the phishing campaign. Outlook’s link preview feature can automatically open links and cause false clicks.


Summary

False clicks are caused by email systems and user actions. Using Direct Email Delivery, validating your configuration, and ensuring correct user behavior will eliminate false click events.