# Risk Score Reports Guide

## Risk Score Reports Guide

In this article, we cover all available reporting options of the **Risk Score Reports.** The risk score formula calculates accurately the risk of a recipient based on critical factors such as position in the company, training completed, phish prone level and data breaches. Furthermore, these reports go into detail about the **overall organisation risk score** and elaborate further on the **riskiest recipients** and **groups.**

&#x20;

**1.** Navigate to **Reports:**

![](/files/nFNsn9LCmJzaHW6hUHE9)

**2.** Select the **RISK SCORE REPORTS:**

![](/files/bCtIrXNAWLRMC9AvpjrH)

You should get the following output:

![](/files/zwqpIi8rDPO1AkUkJgQJ)

**3.** Let’s view the first option called **Organisation Risk Score.** To do this, press on the **View Report** button next to it:

![](/files/9IGihOgGxpKT5XEzXT0c)

![](/files/v5YEnA228moXvNGFq5zu)

As we can see, the organisation risk score report provides **graphs, table,** and evaluation **details** that can help us distinguish the **risk level** of the organisation, as well as the **contributing factors.**

&#x20;

**4.** The **Score Details** section includes a brief literate observation to help us better understand the **risk score status** of the **organisation.**

![](/files/xruUeahuMcCbcp1FVycw)

**5.** You may **download** the report for your own use. Just click on **Export PDF:**

![](/files/lXjkVpQo5eZloALFKd22)

This will export a **snapshot** of the report into a **PDF** file format:

![](/files/y2RRzZSlut5x5b8VSL9Z)

**6.** On the other hand, you can choose to **Export Excel:**

![](/files/l9EP3tSawIwoFJ9reBTF)

![](/files/m8GMRPr66dEwMYcR1nJd)

**7.** Otherwise, click on the **Go Back** button to return to the previous directory:

![](/files/hHE2PEkLQvzppLpV55tF)

**8.** Moving on to the next option of the **Risk Score Reports** called **Riskiest Recipients:**

![](/files/NAiuiMVjngDT04oh6zrW)

![](/files/n24DFDsb45t11g7HpxSQ)

**9.** You can always visit a **recipient’s profile** by clicking on their name:

![](/files/6uJyZlOIedpZa9SFW8Qp)

![](/files/fv1oFE7mQOqbLw5s6yI2)

If you wish, you can navigate to the recipients article through this [link](https://cyberaware-security.gitbook.io/welcome-to-cyberaware-security/admin-portal/recipients).

&#x20;

**10.** Finally, let’s visit the **last** report called **Riskiest Groups:**

![](/files/yCinnC7JU9mzykS2DvYI)

![](/files/9A2srOHTFsQdXzW7Ah7U)

**11.** Just like with recipient profiles, we can visit a **group** by clicking on their name:

![](/files/wPmttiWEYaplGmcb9Lnc)

![](/files/dSKky9m72vo5o3l5VU7w)

For further information about groups, follow this [link](https://cyberaware-security.gitbook.io/welcome-to-cyberaware-security/admin-portal/groups) to reach the appropriate article.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cyberawaresecurity.com/admin-portal/reports/risk-score-reports-guide.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
