{"id":28772,"date":"2022-08-23T10:05:06","date_gmt":"2022-08-23T17:05:06","guid":{"rendered":"https:\/\/tpx2025.wpenginepowered.com\/?page_id=28772"},"modified":"2026-01-29T10:16:53","modified_gmt":"2026-01-29T15:16:53","slug":"phishing-101","status":"publish","type":"page","link":"https:\/\/www.tpx.com\/learn\/phishing-101\/","title":{"rendered":"Phishing 101"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"28772\" class=\"elementor elementor-28772\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c79ee7 elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"2c79ee7\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-acfee6e\" data-id=\"acfee6e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-29a27d4 elementor-widget elementor-widget-heading\" data-id=\"29a27d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Phishing 101 - What is Phishing?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a7720cd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a7720cd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7b26d59\" data-id=\"7b26d59\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-88a8cd7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"88a8cd7\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6aa67f2\" data-id=\"6aa67f2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b2971e5 elementor-widget elementor-widget-heading\" data-id=\"b2971e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Phishing 101 Topics<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-99bce78\" data-id=\"99bce78\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05a189f elementor-widget elementor-widget-image\" data-id=\"05a189f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"695\" height=\"259\" src=\"https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/08\/phishing-101-what-is-phishing.jpg.webp\" class=\"attachment-large size-large wp-image-28874\" alt=\"what is phishing\" srcset=\"https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/08\/phishing-101-what-is-phishing.jpg.webp 695w, https:\/\/www.tpx.com\/wp-content\/smush-webp\/2022\/08\/phishing-101-what-is-phishing-300x112.jpg.webp 300w\" sizes=\"auto, (max-width: 695px) 100vw, 695px\" title=\"\">\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bf1132 elementor-widget elementor-widget-menu-anchor\" data-id=\"2bf1132\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"what\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2dd62d7 elementor-widget elementor-widget-heading\" data-id=\"2dd62d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Phishing?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a9755d elementor-widget elementor-widget-text-editor\" data-id=\"6a9755d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing is a type of social engineering where cybercriminals send fraudulent email or text messages designed to trick the user into exposing sensitive personal information or data. According to Avanan\u2019s Global Phish Report, one out of every 99 emails is a phishing attack, and research further indicates that 25% of phishing emails bypass standard email security. Phishing is the most common and prevalent cyber threat, and as more and more sensitive data is stored and accessed online, cybercriminals see more opportunities in phishing. Roughly 90% of data breaches are the result of phishing according to CISCO\u2019s 2021 Cybersecurity Threat Trends report. Cybercrime and phishing attacks costs are expected \u00a0to rise to <a href=\"https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/#:~:text=The%20damages%20for%202018%20were,than%20it%20was%20in%202015.\" target=\"_blank\" rel=\"noopener\">$10.5 trillion by 2025<\/a>.<\/p><p>Phishing rose to prominence in the mid-1990s with the rapid popularity of the internet, and since then, phishing techniques have gotten more sophisticated and realistic. Now, cybercriminals can employ tactics that utilize deep fakes and artificial intelligence, making phishing even harder to detect. Even fake virtual meetings, fake world health organizations\u2019 announcements regarding COVID-19, and fake COVID-19 relief and stimulus packages are new tactics being introduced every day.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-105fbfd elementor-widget elementor-widget-menu-anchor\" data-id=\"105fbfd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"types\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd26572 elementor-widget elementor-widget-heading\" data-id=\"fd26572\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Types of Email Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-458fa4e elementor-widget elementor-widget-text-editor\" data-id=\"458fa4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>By better understanding the types of email phishing being used, businesses can better protect their business against these ever-evolving tactics. There are many different types of phishing, but the <a href=\"https:\/\/tpx2025.wpenginepowered.com\/phishing-attacks-how-to-recognize-them-and-keep-business-data-safe\/\" target=\"_blank\" rel=\"noopener\">most common tactics are<\/a>:<\/p><h3>Email phishing<\/h3><p>Email phishing is phishing in its most recognizable form. The cybercriminal will masquerade as an entity or person and attempt to trick a person into revealing sensitive information or data. Email phishing can also include malicious links with the goal to deploy software on the victim\u2019s infrastructure like ransomware. A common type of email phishing is business compromise email (BEC), typically attacking an employee or someone in the finance department to gain financial information. BEC rose by <a href=\"https:\/\/www.graphus.ai\/blog\/10-essential-business-email-compromise-statistics\/\" target=\"_blank\" rel=\"noopener\">14% in 2020<\/a> and alarmingly, increased by 80% in some sectors.<\/p><h3>Spear phishing<\/h3><p>Spear phishing is another more sophisticated type of fishing where a cybercriminal has more detailed info about a specific person such as their name, job title, employer name, email address, or specific info about their job role. Spear phishing is typically more convincing and realistic.<\/p><h3>Smishing and vishing<\/h3><p>In smishing, the attack involves criminals sending text messages, and vishing happens over the phone. A common smishing attack is a fake text message from your bank or a popular retailer like Amazon alerting you to suspicious activity. According to ProofPoint\u2019s State of the Phish, less than 35% of people claim to know what smashing is, which is the main reason it\u2019s causing millions of dollars in losses. The research further goes on to say that smishing has risen 328% in 2020 alone, and COVID-19 was a culprit in this uptick. Also, fake two-factor authentication messages are common in smishing, exposing data for platforms like Amazon, Walmart, banks, social platforms, and more.<\/p><h3>Mass campaigns<\/h3><p>Mass phishing campaigns cast a wider net. Emails are sent to the masses from a knock-off corporate entity insisting a password needs to be updated or credit card information is outdated.<\/p><h3>Whaling<\/h3><p>In whaling, a malicious attacker goes after a senior executive. Criminals are attempting to imitate senior staff, and they commonly look like a senior leadership officer asking an employee for a favor. These scams can be very convincing because they play on the need to immediately and effectively please your boss. Sometimes, whaling actually attacks the senior leadership themselves.<\/p><h3>Angler phishing<\/h3><p>A relatively new phishing style, angler phishing involves social media with fake URLs, blog posts, cloned websites, or messages. Attackers are attempting to trick social media users into exposing sensitive information or downloading malicious software.<\/p><p>Other types of phishing attacks include pop-up phishing, pharming, evil twin phishing, watering hole phishing, HTTPS phishing, clone phishing, deceptive phishing, man-in-the-middle attacks, and more.<\/p><h3>Ambulance chasing phishing<\/h3><p>Attackers use a current crisis to drive urgency for victims to take action that will lead to compromising data or information. For example, targets may receive a fraudulent email encouraging them to donate to relief funds for recent natural disasters or the COVID-19 global pandemic. According to Google, it has been reported that cybercriminals have sent an estimated 18 million hoax emails about COVID-19 to Gmail users every day.<\/p><h3>Pretexting<\/h3><p>Pretexting involves an attacker doing something via a non-email channel, for example voicemail, to set an expectation that they\u2019ll be sending something seemingly legitimate in the near future only to send an email that contains malicious links.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a32b38c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a32b38c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4f53840\" data-id=\"4f53840\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-75a0f33 elementor-widget elementor-widget-heading\" data-id=\"75a0f33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Recommended Reading<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f31fcd9 elementor-widget elementor-widget-text-editor\" data-id=\"f31fcd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCheck out this article on <a href=\"\/blog\/nine-ways-managed-it-services-can-help-your-business\/\" target=\"_blank\" rel=\"noopener\">The Best Defense Against Phishing Emails<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7290ae6 elementor-widget elementor-widget-menu-anchor\" data-id=\"7290ae6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"rise\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01841f7 elementor-widget elementor-widget-heading\" data-id=\"01841f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Rise of Email Phishing Attacks<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c160fb0 elementor-widget elementor-widget-text-editor\" data-id=\"c160fb0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As you can see, phishing is incredibly prevalent as the number one attack vector for cybercriminals. Cybercriminals have developed several sophisticated, realistic ways to trick users into revealing sensitive information. The financial impact of phishing attacks has quadrupled over the last six years with enterprise organizations losing roughly <a href=\"https:\/\/threatpost.com\/phishing-costs-quadrupled\/168716\/\" target=\"_blank\" rel=\"noopener\">$1,500 per employee<\/a>. Additionally, the rise of remote work has allowed even more data to be transmitted over email, offering criminals even more chances to trick and infiltrate emails.<\/p><p>Phishing consequences are severe, too; the cost to contain malware, productivity losses, and the cost to contain credentials all cause a flurry of expenses that contribute to damages for the average business. Also, the main reason phishing is so relevant is simple \u2014 it works.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b90e133 elementor-widget elementor-widget-menu-anchor\" data-id=\"b90e133\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"spear\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e18a2b elementor-widget elementor-widget-heading\" data-id=\"6e18a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing vs. Spear Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b76118 elementor-widget elementor-widget-text-editor\" data-id=\"4b76118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The two most popular methods of phishing are email phishing and spear phishing. These two types of attacks have a lot in common (like coercive language or a sense of urgency), they\u2019re delivered via email, hackers are after some type of sensitive information, and they rely on impersonation.<\/p><p>However, a key difference between the two resides in how targeted the message is. Email phishing is often low-effort and not tailored to every victim. Hackers are casting a wide net in hopes of landing a handful of victims. On the other hand, spear phishing is highly targeted and only sent to one person or organization. This type of attack requires much more effort but is more rewarding when it\u2019s successful.<\/p><p>Additionally, spear phishing can target something more sensitive than simple login information. Cybercriminals might be after trade secrets or customer data they could sell for a large sum of money. According to Symantec\u2019s Internet Security Threat Report, 65% of targeted attacks are spear phishing, and intelligence gathering was the main goal in 95% of those cases.<\/p><p>To protect your organization from spear phishing, email scanning and detection help prevent and block attacks. However, as Stanford Research reported, 88% of data breaches are caused by human error, and the best tool is <a href=\"https:\/\/tpx2025.wpenginepowered.com\/services\/managed-it\/security-awareness-training\/\" target=\"_blank\" rel=\"noopener\">employee security awareness training<\/a>. Educating team members to be the first line of defense is the most effective technique, helping them expand their awareness to reduce threats. Empower employees to be a part of the solution instead of the problem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b89f8ce elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b89f8ce\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-30918e5\" data-id=\"30918e5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ae9f6a4 elementor-widget elementor-widget-heading\" data-id=\"ae9f6a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Implement a Security Awareness Program<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a6e0407 elementor-widget elementor-widget-text-editor\" data-id=\"a6e0407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCheck out our guide on <a href=\"\/blog\/seven-ways-to-enable-a-successful-security-awareness-program\/\" target=\"_blank\" rel=\"noopener\">Seven Ways to Enable a Successful Security Awareness Program<\/a>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ad1f70 elementor-widget elementor-widget-menu-anchor\" data-id=\"7ad1f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"examples\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f408533 elementor-widget elementor-widget-heading\" data-id=\"f408533\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing Email Examples<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-315c83b elementor-widget elementor-widget-text-editor\" data-id=\"315c83b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The best way to protect against phishing emails is through education and familiarizing yourself and your staff about how to identify phishing email tactics. Below are a few phishing email examples:<\/p><h3>Email Phishing Example:<\/h3><p>Typically found in high-volume spam emails to hundreds or thousands of people, email phishing generally includes malicious links or attachments.<\/p><p><strong>Sender:<\/strong> HR Department<\/p><p><strong>Subject Line:<\/strong> Sign Updated Employee Handbook<\/p><p><em>\u201cEffective today there is a new employee handbook that requires your signature. 20% of employees have acknowledged the handbook, and we\u2019re looking to get to 100% by Friday! Please click the link below to sign.<\/em><\/p><p><em>(malicious link)\u201d<\/em><\/p><p>Often, an email like this will appear like it\u2019s from a trusted entity like the HR department, but the actual email address does not match the domain. The attacker will claim the target needs to sign a new employee handbook, and the link will be a malicious link that will lead them to a screen to input sensitive information, or it will download malicious software onto their device.<\/p><h3>Spear Phishing Example:<\/h3><p>In these targeted attacks, cybercriminals play on the authority of trusted organizations like Microsoft Teams, Google Business Suite, Slack, Amazon, or your bank to trick you into revealing sensitive information.<\/p><p><strong>Sender:<\/strong> Google Business<\/p><p><strong>Subject Line:<\/strong> Your Boss Requested Information<\/p><p><em>\u201cHi FIRST NAME,<\/em><\/p><p><em>Your boss, NAME, is requesting you update your information in your organization\u2019s directory.<\/em><\/p><p><em>Click here to update your credentials.\u201d<\/em><\/p><p>In this spear phishing example, the cybercriminal has a wide depth of knowledge about the employee and the organization, which unfortunately makes it quite effective. Often playing on the authority of a boss or leadership, an employee might feel a sense of urgency and duty to quickly complete the request.<\/p><p>Other common phishing tactics include hyperlinks with a malicious site when you hover over the link, fake credit card websites, malicious attachments, and more.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36124df elementor-widget elementor-widget-menu-anchor\" data-id=\"36124df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"indicators\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1194738 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1194738\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-9af81fc\" data-id=\"9af81fc\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0f1a2d elementor-widget elementor-widget-heading\" data-id=\"e0f1a2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Learn More<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58b4984 elementor-widget elementor-widget-text-editor\" data-id=\"58b4984\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRead this article to learn more on <a href=\"\/blog\/improve-email-security-with-inbox-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">how to improve email security<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-350af09 elementor-widget elementor-widget-heading\" data-id=\"350af09\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Indicators of a Phishing Attempt<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a26977 elementor-widget elementor-widget-text-editor\" data-id=\"6a26977\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>What should employees look for when staying proactively alert about phishing scams? With ineffective security awareness training, employees can search for these common indicators of a phishing attempt.<\/p><ul><li>Grammar errors and misspelled words<\/li><li>An unusual request or ask<\/li><li>An odd sense of urgency<\/li><li>Links don\u2019t match the domain<\/li><li>The sender\u2019s name looks odd or doesn\u2019t match the organization\u2019s name<\/li><li>An ask for sensitive information<\/li><\/ul><p>To report phishing emails, an email security solution can make it easy for employees to report suspicious emails and quickly get confirmation if it is a malicious phishing email or safe. <a href=\"https:\/\/tpx2025.wpenginepowered.com\/services\/managed-security\/inbox-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">Inbox detection and response<\/a> is helpful in empowering employees to immediately report fraudulent-looking emails right from their inbox.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d665232 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d665232\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ac25fe2\" data-id=\"ac25fe2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8cb45fe elementor-widget elementor-widget-heading\" data-id=\"8cb45fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">More Helpful Insights<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0327424 elementor-widget elementor-widget-text-editor\" data-id=\"0327424\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCheck out this article for more <a href=\"\/blog\/dont-get-phished\/\" target=\"_blank\" rel=\"noopener\">common indicators of a phishing attempt<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-899c6f1 elementor-widget elementor-widget-menu-anchor\" data-id=\"899c6f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"protect\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74f1dea elementor-widget elementor-widget-heading\" data-id=\"74f1dea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Protect Your Business From Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89a5ef4 elementor-widget elementor-widget-text-editor\" data-id=\"89a5ef4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There are a few ways to protect your business from phishing. <a href=\"https:\/\/tpx2025.wpenginepowered.com\/services\/managed-security\/user-security\/\" target=\"_blank\" rel=\"noopener\">Employee Security Awareness Training<\/a> is a basic level of defense that is highly effective in educating team members. This makes employees a part of the defense strategy and reinforces good security habits.<\/p><p>Next, <a href=\"https:\/\/tpx2025.wpenginepowered.com\/services\/managed-security\/inbox-detection-and-response\/\" target=\"_blank\" rel=\"noopener\">Managed Inbox Detection and Response from TPx<\/a> puts employees in the driver\u2019s seat and provides professional evaluation and handling of suspicious emails reported by users \u2014 right from the inbox.<\/p><p>It\u2019s critical for businesses to invest in phishing protection solutions to proactively prevent them from becoming a statistic. End-user security is crucial because no employee is immune to attacks. According to a recent Terranova report, almost 20% of all employees are likely to click on phishing email links, and a staggering 67% enter their credentials on a phishing website.<\/p><p>It only takes one email to drastically affect your organization, and a single employee can cause hundreds of thousands of dollars in damages. Investing in <a href=\"https:\/\/tpx2025.wpenginepowered.com\/services\/managed-security\/user-security\/\" target=\"_blank\" rel=\"noopener\">TPx\u2019s End-User Security<\/a> boosts overall company protections and secures thousands of critical, sensitive data points from cybercriminals.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1c2784b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1c2784b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3a0cd58\" data-id=\"3a0cd58\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f6112fa elementor-widget elementor-widget-heading\" data-id=\"f6112fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Boost Your Email Security<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f5edea elementor-widget elementor-widget-text-editor\" data-id=\"9f5edea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGet help with our <a href=\"\/blog\/email-security-checklist\/\" target=\"_blank\" rel=\"noopener\">Comprehensive Email Security Checklist<\/a>.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-350af75 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"350af75\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8594ca9\" data-id=\"8594ca9\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7bf48f9 elementor-widget elementor-widget-heading\" data-id=\"7bf48f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Start protecting your organization from phishing attacks<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c0a450 elementor-widget elementor-widget-text-editor\" data-id=\"7c0a450\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWe can help. Get in touch with our certified cybersecurity experts today.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f87085 elementor-widget elementor-widget-text-editor\" data-id=\"2f87085\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<!DOCTYPE html><html><head><meta charset='UTF-8' \/><\/head><body class='GF_AJAX_POSTBACK'><p class=\"gform_not_found\">Oops! We could not locate your form.<\/p><\/body><\/html>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5111da2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5111da2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ea893c\" data-id=\"8ea893c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7959b66 elementor-widget elementor-widget-html\" data-id=\"7959b66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\r\njQuery('.ginput_recaptcha').each(function(i)\r\n{\r\n    var thisID = jQuery(this).attr('id');\r\n    jQuery(this).attr('id', thisID+'_'+i);\r\n});\r\n<\/script>\r\n<style>\r\ninput[id^=\"gform_submit_button_\"] {\r\n    background-color: #70BF54 !important;\r\n    color: #fff !important;\r\n}\r\ninput[id^=\"gform_submit_button_\"]:hover {\r\n    background-color: #0079C2 !important;\r\n    color: #fff !important;\r\n}\r\n<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing 101 &#8211; What is Phishing? Phishing 101 Topics 1 What is Phishing? 2 Types of Email Phishing 3 The Rise of Email Phishing Attacks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28874,"parent":16948,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"resources-tags":[611],"class_list":["post-28772","page","type-page","status-publish","has-post-thumbnail","hentry","resources-tags-learning"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/28772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/comments?post=28772"}],"version-history":[{"count":0,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/28772\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/pages\/16948"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media\/28874"}],"wp:attachment":[{"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/media?parent=28772"}],"wp:term":[{"taxonomy":"resources-tags","embeddable":true,"href":"https:\/\/www.tpx.com\/wp-json\/wp\/v2\/resources-tags?post=28772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}