Phishing (pronounced “fishing”) is a type of fraud in which the victim is contacted by telephone, text message, or email by someone pretending to be a legitimate organisation.
The fraudster will try to trick you into providing sensitive data such as passwords, credit card details, and addresses under pretenses.
Phishing attacks can take many forms, from official-looking emails asking you to confirm a password to threatening phone calls ordering you to take urgent action. The most important thing is to stay calm and look for the warning signs of a phishing attack before revealing any sensitive info.
Phishing is a social engineering attack commonly used to steal sensitive data like credit card details and login credentials. It happens when phishers disguised as trusted entities (e.g., Amazon or a bank) trick victims into accepting fraudulent messages through emails, text messages, or phone calls.
These messages commonly contain malware or malicious links to fool the recipient into providing sensitive information. Many fraudsters go to great lengths to create digital disguises, so even if a message or link looks official, not everything is as it seems.
Being able to identify phishing emails reliably will help you avoid these tricksters and keep your information secure, so look out for these warning signs:
Phishing attacks come in various types, so you should know how to spot common phishing scams to protect your sensitive information from scammers. We’ve included a detailed list of five common types of phishing attacks so that you can detect threats and protect your sensitive information:
By far the most common phishing attack, deceptive phishing involves fraudsters impersonating a legitimate company and asking you to click a link or enter sensitive info. Watch out for emails with minimal content, odd email addresses, or small spelling, grammar, and design errors.
A more targeted form of scam, spear phishing uses a personal touch, customising emails with the target’s name, company, and/or contact information. However, just because an email refers to you by name or asks you to log in to your company’s ‘official’ portal doesn’t make it genuine.
Much like spear phishing, whaling uses personalised emails to fool a senior executive or CEO and steal their data. Train all your employees in security protocol and consider two-factor authentication on your bank accounts to avoid these phishing attacks.
Scammers sometimes call targets over the phone using tools like a Voice Over Internet Protocol (VOIP) server to hide their identity. These phishing calls often use pre-recorded messages, so avoid answering unknown phone numbers and never give out personal info over the phone.
Scammers may also text you a link or fake questionnaire to get your info over the phone. These scams can be fake competitions, so avoid following links in SMS messages unless you can trust the sender.
If you think a phishing attack may have compromised you, it’s important to check the state of your website and personal security quickly. By following our tips below, you should be able to see whether your site is locked up tight or hacked open.
Unless there are obvious signs like your website being replaced with a ransom message, it can be tough to determine if your site is still secure. But rather than keep yourself awake with paranoia, run through these simple checks to answer the burning question of whether your website is hacked:
The Google Search Console is a powerful tool for any website administrator, allowing you to monitor search engine rankings, site stats and security issues. If you don’t have an account, create one and view your “Security Issues” report to see data on your site’s security issues.
Google’s Safe Browsing tool protects users from phishing attacks, malware and social engineering by warning them of dangerous sites and software. Google scans for malware daily, using advanced statistical models to look for phishing sites, so the safe browsing tool is an easy way to check your site for security issues.
Sometimes, your hosting provider, internet browser, or other internet users will notify you of a hacked site. While you should never rely on these notifications alone, you can quickly increase the odds of detecting a hacked site by using reputable hosting providers and malware scanners, to name a few solutions.
With a focused search – type “site:domainname.co.uk” into Google – you may be able to find malware or phishing activity on your site. If it sounds too easy, Google technicians have worked hard to flag suspicious websites with “this site may be hacked” warnings, especially when using targeted searches like the command listed above.
Another handy web tool from Google, the Hacked Sites Troubleshooter, is recommended when trying to find hacked content on your site and searching for remaining issues. This free tool includes a helpful beginner’s guide, so why not get to grips with the troubleshooter today?
Now that you know how to detect a phishing attack, you’re probably wondering about the damage it can cause to a business. As one of the main delivery methods for malware, data breach attacks, and scams of all kinds, phishing remains a serious threat to businesses, and the costs of failing to address it can result in…
Many phishing scams have the sole aim of ripping off the recipient, which can be a serious inconvenience for individuals but potentially devastating for businesses. An employee being scammed into making a fraudulent purchase pales compared to a scammer with access to your bank account, so ensure you have strong safety measures in place.
A common phishing tactic is impersonating a reputable company, so your reputation could be suffering from scammers impersonating your business or spoofing your domain. Even if you had nothing to do with the scam, the victim may lose trust in your business, so use email authentication to avoid email spoofing.
One of the costliest types of malware, ransomware is often delivered through phishing emails and can cripple entire organisations in extreme circumstances. In a ransomware attack, the hacker encrypts files, making them unusable, before demanding a ransom (often in cryptocurrency) to supply a decryption key.
Individual users must exercise scepticism and vigilance in protecting against phishing attacks. Spoofed messages often contain subtle mistakes that reveal their true nature. As a rule, never follow links in messages or give out personal information unless you can trust the sender.
Phishing emails continue to evolve as hackers develop ever-more elaborate scams to gain your trust (and your data), adopting some good security practices will help you avoid the worst of them. While hackers are constantly coming up with new ways to take advantage of businesses, there are some measures you can take to protect yourself and your business, such as:
Because phishing attacks rely on deception and social engineering to succeed, education and caution remain the number one defence. If you can educate your employees on cybersecurity and instil a healthy paranoia of suspicious emails, then you’re closer to stopping phishing emails than most.