Spear phishing is a targeted attack delivered via email – commonly using some piece of information like the recipients name, their bank, a company they work with etc. People are much more likely to fall for these type of attacks than general phishing which is random and not targeted.
It works because they’re believable and people act without putting much thought into it – someone might be used to receiving random password change emails from time to time and so when an email appearing to be from their bank comes in to change their password, they comply without much 2nd thought.
Spelling/grammar – The creators of phishing emails are usually not native English speakers. Un-capitalized letters like “i” or oddly used wording like “await response asap” are both red flags it is a spear phish attempt.
Urgency – Typically the senders of spear phishing emails want you to act quick without thinking too much about it. If you see words like ASAP, or URGENT in the email, this is a key indicator it is a phish.
Generic addressee title – Many times, the creators of malicious email may only know one piece of information about you, such as the bank you use, but not your name. They may use something like ‘Dear Mr President’ to address you which most likely is not how you are addressed.
Disguised links – Always hover over links before clicking them, a malicious link will usually appear as an odd website you’ve never heard of but this may also be the case with legitimate tracked links which are used by marketing systems. The best defense is to check the email headers and make sure it is actually coming from someone you know.
Shortened URLs – If the link uses a URL shortener like bit.ly, then hovering over it won’t work. URL shorteners are dangerous because it could link to anywhere. If you are
A suspicious attachment – An attachment that is trying to imitate one you normally receive but with different naming or with a suspicious extension is a key indicator of a spear phishing attempt. Always check the header of the email to ensure that the address it appears to be coming from is the actual address.
Verify if the message is legitimate by calling or emailing directly – do not use any phone numbers contained in the email, go on the company website through a search engine and call.
Security Awareness Training – knowing how to identify potential attacks is key to stopping them. By going through training and learning the common methods used, you will be much more vigilant.
Advanced Email Security – Attachment defense, URL defense, and many more features will block malicious emails.
You receive an email appearing to be from the CEO with all the same layout you are used to. They
Notify IT staff – let them examine the email and let them know the actions you took in the email
With cyber threats increasing in sophistication, businesses are under pressure to try and stay ahead…
Cybersecurity has become an ever-critical concern for businesses of all sizes. In 2025, as remote…
In the world of compliance and auditing, businesses often have to grapple with a variety…
With the ever-evolving digital world, businesses are under constant attack in the cyber world, which…
Within this contemporary world, when cyber security threats are gradually becoming more innovative and more…
In today's digitized world, the protection of a business's IT infrastructure has become more crucial…