Phishing is the most common starting point for cyberattacks against businesses. It does not require sophisticated hacking skills. It requires only that one person on your team clicks a link, opens an attachment, or enters their credentials on a convincing fake website. That one action can hand an attacker complete access to your systems. Understanding how these attacks work — and what gives them away — is one of the most valuable things you can learn.
What Phishing Actually Is
Phishing is a form of social engineering. Instead of breaking through technical defenses, the attacker tricks a person into doing the work for them. A phishing message impersonates a trusted sender — a bank, a vendor, a government agency, or even a colleague — and creates a reason for you to take an action: click a link, open a file, provide login credentials, or transfer money.
The name comes from "fishing" — casting a wide net and seeing who bites. A basic phishing campaign might send the same message to millions of addresses, hoping that a small percentage will click. Even a 0.1% success rate on a million emails is a thousand victims.
The Main Types of Phishing
- Email phishing. The most common form. A mass-sent email impersonating a well-known company or institution, designed to get you to click a link or download a file.
- Spear phishing. A targeted attack where the attacker researches you specifically. They might know your name, your role, your colleagues' names, or your clients. The message feels personal and relevant, making it far more convincing than generic phishing.
- Business Email Compromise (BEC). The attacker impersonates someone inside your own organization — often the owner or a senior executive — and requests a wire transfer, a gift card purchase, or a change to payment details. This costs small businesses billions of dollars every year.
- SMS phishing (smishing). The same tactics delivered by text message. Common examples include fake package delivery notifications and fraudulent bank alerts.
- Voice phishing (vishing). A phone call from someone pretending to be tech support, the IRS, your bank, or a vendor. They create urgency and ask for information or remote access to your computer.
Red Flags That Reveal a Phishing Attempt
Even well-crafted phishing attempts leave traces. These are the signals to look for:
- Urgency and pressure. "Your account will be suspended in 24 hours." "Action required immediately." Urgency is a manipulation tactic. Legitimate organizations give you time. When something creates pressure to act right now, slow down instead.
- The sender's email address does not match. The display name might say "PayPal Support" but the actual email address is something like paypal-security@mail-alerts-003.com. Always look at the full address, not just the name.
- Hover over links before clicking. In most email clients, hovering over a link reveals the actual URL it points to. If the link says "log into your bank account" but the URL is a string of random characters or an unfamiliar domain, do not click it.
- Generic greetings. "Dear Customer" or "Dear Account Holder" instead of your name suggests a mass-sent message that doesn't know who you actually are.
- Requests for credentials or payment. Legitimate services will never ask you to confirm your password by clicking a link in an email. Your bank will not ask for your full account number in an email. Any such request is a red flag.
- Unexpected attachments. An email you were not expecting that includes an attachment — especially a Word document, Excel file, PDF, or ZIP file — should be treated with extreme caution before opening.
- Something feels slightly off. Trust your instincts. If a message from a vendor uses slightly different language than usual, comes at an unusual time, or makes a request that feels out of character, verify it before acting.
Business Email Compromise — where an attacker impersonates an executive to request a wire transfer — resulted in over $2.9 billion in losses in the US in 2023 alone. Small businesses are disproportionately affected because they tend to have fewer approval layers around financial transactions.
How AI Is Changing the Game
For years, phishing emails were easy to spot because they were poorly written — bad grammar, awkward phrasing, obvious errors. That is no longer a reliable indicator. AI writing tools now produce polished, grammatically perfect phishing messages indistinguishable from legitimate communication.
AI voice cloning allows attackers to replicate the voice of a CEO or colleague with just a few minutes of audio scraped from social media or public sources. Employees have wired money after receiving what they believed was a phone call from their boss. The technology exists and it is being used.
This means you can no longer rely on spotting errors. You have to verify through independent channels when anything involving money, credentials, or sensitive information is requested.
What to Do When You Suspect a Phishing Attempt
- Do not click anything. Do not click links, do not open attachments, do not reply.
- Do not call any phone number included in the message. It may connect you to the attacker.
- Verify through a separate channel. If the message claims to be from your bank, call the number on the back of your card — not any number in the email. If it claims to be from a colleague, call them directly or walk over to their desk.
- Report it internally. Let your team know so they can be alert if they receive the same message.
- If you already clicked something: Do not panic, but act immediately. Disconnect from the network, change your passwords from a different device, and contact your IT provider or security team.
Action Steps
- Share this guide with your entire team. Everyone who handles email needs to know these signals.
- Establish a clear internal rule: any request involving money or credential changes requires verbal confirmation through a known channel before acting — no exceptions.
- Show your team real examples of phishing emails. Walk through what makes them convincing and what gives them away.
- Enable multi-factor authentication on all accounts so that even if credentials are stolen, the attacker cannot use them.
- Consider running a simulated phishing test on your team once or twice a year to keep awareness high and identify who needs more training.