clicking the embedded link, entering data on a landing page, opening an attachment, enabling a macro on an attachment, or replying to the simulated phishing email. Since a single user may take more ...