NEW New report: Invalid click rate benchmarks of 85,000 Google accountsCompare yours here
New report: Invalid Click Rate Benchmarks

What is Phishing?

what is phishing

Phishing is a type of fraud where scammers send emails pretending to be from reputable organizations like Apple, PayPal, and the IRS. The goal is to get you to share your personal, identifying information, payment information, or account information like passwords. Some phishing attempts will ask you for this info directly, while others may lead you to a convincing sign-in page that’s just a capture form for your sign-in credentials.

75% of organizations worldwide were attacked by phishing in 2020, with 96% of the attacks coming through email, according to leading security company Tessian. The average cost of a compromised record is $150,000. The average cost of a data breach is $3.92 million, not including the catastrophic reputation damage that will follow.

Types of Phishing

There are seven categories of phishing known as spear phishing, whaling, smishing, vishing, email phishing, sextortion, and search engine phishing.

  1. Spear phishing: This targets a specific group, individual, or role within companies. It’s called spear phishing because when you fish with a spear, you choose a specific target instead of pulling in whatever bites on a line.
  2. Whaling: This targets CEOs, CFOs, and other c-suite leaders of large businesses within specific industries. Fraudsters will try to get the company’s tax ID and bank account numbers by claiming the company is being sued or some other such scam.
  3. Smishing: Smishing is SMS phishing or phishing through text. The message usually provides a link or a phone number that will lead you to the scam. The attack might ask you to verify your banking details, social security number, and other personal information to steal funds or your identity.
  4. Vishing: This is voice phishing, phishing that comes through a voice call. The most well-known example of vishing is the Microsoft caller claiming a virus on your computer. They prompt you to upgrade your virus protection to solve the issue, but what really happens is you install malware on your computer, and criminals now have your credit card details. The malware is controlled by CnC and will do whatever the hacker wants, including stealing your banking login info or participating in a DDoS attack.
  5. Email phishing: This is the most common type of phishing. Hackers have been sending these emails to any address they can get since the 90s. The emails usually say your account has been locked or compromised, and you have to follow the link and enter your details to fix it. You should always check the source address and, if you’re suspicious, go directly to your account from your browser without using the link in the email.
  6. Sextortion: This is a type of blackmail where the scammer will send an email that looks like it came from your address. They’ll claim to have control of your email account, as well as a video from your webcam that was taken while you were watching adult video. They’ll threaten to share the video with your family and colleagues unless you pay them, usually in bitcoin.
  7. Search engine phishing: This is also known as SEO poisoning and SEO trojans. It requires that the hackers become the top hit for a search phrase on Google or other search engines. When users click their link, they’re taken to the hackers’ website, where their personal information can be stolen. These hacker sites often pose as banking and social media sites.

How to prevent Phishing

Preventing phishing attacks requires a combination of technology, vigilance, and ongoing education. Here are the top ways to protect yourself and your organization from phishing:

  • Use Security Software and Keep Systems Updated
    Install and maintain up-to-date security software—including antivirus, anti-malware, and firewalls—on all devices. Set these tools to update automatically to ensure protection against the latest threats. This also applies to operating systems and browsers, which should be patched regularly to close security vulnerabilities. 
  • Implement Multi-Factor Authentication (MFA)
    MFA adds an extra layer of security by requiring users to provide two or more verification factors—such as a password and a code sent to a mobile device—before accessing sensitive accounts. Phishing-resistant MFA (like FIDO authenticators) is especially effective, as it reduces the risk of credential theft
  • Educate and Train Employees
    Regularly train staff to recognize phishing attempts, including suspicious emails, links, and attachments. Conduct simulated phishing campaigns to test awareness and reinforce good habits. Encourage employees to report suspicious messages to IT or security teams
  • Use Advanced Email Security Solutions
    Deploy email filtering tools that automatically block or quarantine suspicious messages. These solutions use blocklists and advanced algorithms to detect and prevent phishing emails from reaching inboxes
  • Be Vigilant and Question Unsolicited Communications
    Always scrutinize unexpected emails, texts, or calls, especially those requesting sensitive information or urgent action. Look for red flags like poor grammar, mismatched sender addresses, and suspicious links or attachments
  • Never Share Sensitive Information via Email
    Avoid sending personal or financial information through email unless you are certain of the recipient’s authenticity and the communication is secure
  • Use Strong, Unique Passwords
    Create complex passwords for each account and avoid reusing them. Consider using a password manager to generate and store passwords securely
  • Back Up Data Regularly
    Regularly back up important data to external drives or cloud storage. This ensures you can recover your information if a phishing attack leads to data loss or ransomware.
  • Report and Respond Promptly
    If you suspect a phishing attempt, report it to your IT department or relevant authorities. If you fall victim, change affected passwords immediately, notify banks, monitor accounts for unauthorized activity, and disconnect compromised devices from the internet to prevent further damage
  • Use Anti-Phishing Tools and Browser Extensions
    Install browser extensions or add-ons that block known phishing sites and warn you of suspicious links. Examples include Netcraft, Avira Browser Safety, and Web of Trust

By combining these strategies—technology, education, and proactive habits—you can significantly reduce the risk of falling victim to phishing attacks.

Facebook
Twitter
LinkedIn
Email

More from Fraud Blocker