Categories: Threat Insight

Email Phishing

What is phishing?

Phishing is a scam where psychological manipulation is used to scare or trick victims into giving away sensitive data like passwords or paying money through the use of fraudulent invoices.

What types of phishing are there?

Spear phishing – These are emails that are targeted at individuals. Typically

Whaling/business email compromise – this involves targeting upper management, usually c-level, into releasing sensitive information or making fraudulent payments.

What does whaling look like?

Clone phishing – in these attempts, a previously delivered legitimate email that contains an attachment or link has its content taken and replaced into an email

General phishing –

How do I spot phishing scams?

Grammar – since the majority of phishing email creators are not native English speakers, they tend to make mistakes in their writing. Words will be misspelled, formatting such as spacing may be off and the usage of words may not sound normal. These are all major tell tale signs that the email you are viewing is not legitimate.

Impersonal – Since the sender often does not know much about the recipient, the email

Email Header –

Asking for a quick reply –

See our blog post on how to spot phishing emails –

How do I stop phishing scams from succeeding in my organization?

Advanced email security – The best course of action is to have email security in place that will block the vast majority of phishing attempts.

Security awareness training – For when phishing emails do get past your prevention systems, you need users that are knowledgeable and vigilant.

Ron Samson

Recent Posts

What Apps Are Used in SIEM and How They Enhance Cybersecurity

Security Information and Event Management (SIEM) systems have become essential tools in today’s cybersecurity landscape.…

3 weeks ago

What You Need to Know About SIEM Integration with Your Existing Infrastructure

Today, organizations need a cybersecurity tool that will offer detection and response, among other services,…

4 weeks ago

SIEM Providers for Small Businesses: Affordable and Effective Options

The threat vectors in cybersecurity are increasing, and cyber attackers are targeting small businesses due…

4 weeks ago

What Affects EDR Pricing? Key Factors to Consider When Selecting Endpoint Protection

Sophisticated cyber threats have driven the demand for Endpoint Detection and Response (EDR) software, making…

4 weeks ago

The Benefits of EDR Software: A Deep Dive into Proactive Threat Detection

With cyber threats increasing in sophistication, businesses are under pressure to try and stay ahead…

1 month ago

EPP vs EDR: What You Need to Know About Endpoint Protection in 2025

Cybersecurity has become an ever-critical concern for businesses of all sizes. In 2025, as remote…

1 month ago