The results of phishing campaigns are often not comparable with each other over time. Various security vendors and red teams use different tooling and techniques - which is totally fine.
However, I recommend requiring tracking a minimum set of metrics to be able to compare results over time.
Funny side facts: At times employees are messing with the red team, entering invalid creds for CISO or CEO and things along those lines.
Telecom touches everything that everyone does, and the insertion points are nearly limitless. F5 Labs' Preston Hogue writes for SecurityWeek, discussing the specific prevention measures telecom providers can take to protect themselves and their customers.