P

Phishing

Also known as:email fraudphishing attacksocial engineering email

A social engineering attack where criminals send deceptive emails, messages, or create fake websites designed to trick people into revealing sensitive information like passwords, financial data, or personal details.

In-Depth Explanation

Phishing is a social engineering technique where attackers impersonate trusted entities to trick victims into revealing sensitive information, clicking malicious links, or downloading malware. It remains the most common initial attack vector for cyberbreaches.

Types of phishing:

  • Email phishing: Mass emails impersonating legitimate organisations
  • Spear phishing: Targeted attacks against specific individuals
  • Whaling: Phishing targeting senior executives and decision-makers
  • Smishing: Phishing via SMS text messages
  • Vishing: Phishing via voice calls
  • Clone phishing: Duplicating a legitimate email with malicious modifications
  • Business Email Compromise (BEC): Impersonating executives to authorise transfers

Common phishing tactics:

  • Urgency ("Your account will be suspended in 24 hours")
  • Authority ("Message from your CEO")
  • Fear ("Unusual activity detected on your account")
  • Reward ("You have won a prize")
  • Curiosity ("Someone shared a document with you")
  • Trust ("Invoice from your supplier attached")

Phishing red flags:

  • Sender address does not match the claimed organisation
  • Urgency or pressure to act immediately
  • Generic greeting ("Dear Customer" instead of your name)
  • Suspicious links (hover to check actual destination)
  • Unexpected attachments
  • Requests for sensitive information via email
  • Poor grammar and spelling (though AI makes this less reliable)

Phishing protection measures:

  • Email filtering and security (Proofpoint, Mimecast, Microsoft Defender)
  • Security awareness training for all staff
  • Multi-factor authentication (MFA) on all accounts
  • DMARC/SPF/DKIM email authentication
  • Phishing simulation exercises
  • Reporting mechanisms for suspected phishing
  • URL filtering and web security

Business Context

Phishing is the initial attack vector in 36% of data breaches and 80% of reported security incidents. The average cost of a successful phishing attack for Australian mid-market businesses is $250,000-$500,000.

How Clever Ops Uses This

Clever Ops protects Australian businesses from phishing through multi-layered defences: email security platforms, DMARC/SPF/DKIM configuration, MFA implementation, and regular phishing simulation exercises. We build security awareness programs that train staff to recognise and report phishing attempts effectively.

Example Use Case

"An Australian business implements Microsoft Defender for email filtering, configures DMARC to prevent domain spoofing, deploys MFA for all accounts, and runs monthly phishing simulations, reducing successful phishing incidents from 12 per year to zero."

Frequently Asked Questions

Category

cybersecurity

Need Expert Help?

Understanding is the first step. Let our experts help you implement AI solutions for your business.

Ready to Implement AI?

Understanding the terminology is just the first step. Our experts can help you implement AI solutions tailored to your business needs.

FT Fast 500 APAC Winner|50+ Implementations|Harvard-Educated Team