Security Education

The Cost of One Click

A mechanism-first model that links click events to bounded, evidence-backed business impact.

A click is an event, not automatically a breach. This page shows how to move from a click to a bounded impact statement using observable evidence.

1) Problem this page solves

Teams often jump from "someone clicked" to "major incident" before proving what failed and what business effect occurred. This page provides a disciplined impact path so response decisions are proportionate to evidence.

2) Reader outcome

After this page, you should be able to:

  • map a click event to an impact level without over-claiming
  • identify the minimum evidence needed to support each level
  • choose containment and escalation actions based on confidence

3) Mechanism-first impact model

Impact levelEvent -> control failure path -> business effect categories
Level 0: Exposure attemptUser clicks a suspicious link -> no confirmed credential/session capture -> user risk and monitoring workload only
Level 1: Potential compromiseUser clicks and submits credential/session material -> attacker now has usable access material if controls fail -> elevated account misuse risk
Level 2: Confirmed account misuseCaptured access material is used successfully -> MFA/session/token controls fail, are bypassed, or are absent -> communication integrity risk, confidential data access risk, transaction process risk
Level 3: Confirmed business effectUnauthorized access persists long enough for downstream action -> preventive and detective controls do not interrupt in time -> realized effects such as fraudulent transaction attempts, unauthorized disclosure, or measurable operational disruption

Business effect categories should stay bounded to what is evidenced: financial process integrity, confidentiality, operational continuity, and trust in official communications.

4) Observable evidence needed to support each impact level

Impact levelMinimum supporting evidence
Level 0Original phishing message or URL, user click telemetry, and timeline entry showing no confirmed submission
Level 1Evidence of submission behavior (form post, browser artifact, or preserved phishing workflow) plus user/account linkage
Level 2Identity-provider or service logs showing successful unauthorized sign-in/token use, with contextual anomalies (device, IP, geo, timing, rule changes)
Level 3Verifiable downstream artifacts tied to the unauthorized access path (payment instruction trail, data access/export logs, or service-impact records)

If evidence only supports a lower level, keep impact statements at that lower level until additional facts are confirmed.

5) Practical response and escalation decisions by impact confidence

Confidence in impact claimPractical responseEscalation decision
Low (single signal, gaps remain)Preserve artifacts, validate user account activity, begin targeted containment for exposed accountEscalate to security lead when privileged or finance-adjacent accounts are involved
Medium (multiple aligned signals, some uncertainty)Revoke sessions/tokens, rotate credentials, inspect mailbox rules and high-risk workflowsEscalate to incident owner and affected business process owners
High (corroborated technical and business evidence)Execute full incident workflow, document scope and affected processes, track remediation to closureEscalate to executive, legal, and compliance channels per policy triggers

6) What WitnessOps controls can support vs cannot guarantee

WitnessOps can support:

WitnessOps cannot guarantee:

  • that users will never click or submit credentials
  • that third-party telemetry will always be complete or timely
  • reversal of financial loss or external-party actions
  • legal or insurance outcomes beyond the available evidence record

7) Observed vs inferred separation

Treat these as separate statement types in reports:

  • Observed: directly supported by artifacts or logs (for example, "successful sign-in from new device at 09:13 UTC")
  • Inferred: plausible interpretation not yet directly proven (for example, "attacker likely harvested credentials from lookalike page")

Do not present inferred impact as confirmed impact. Keep both tracks visible until evidence resolves uncertainty.

8) Trust assumptions and limits

  • Source logs are trusted only to the extent they are complete, retained, and time-synchronized.
  • User testimony is useful context but may be incomplete under stress.
  • Some attacker actions can occur outside available telemetry.
  • Impact estimates should be revised as new evidence arrives; early estimates are provisional.

9) Next-page handoff

To reduce the chance that Level 1 becomes Level 2, continue to Why MFA Stops Most Attacks.