Back to contents

Phishing

Cybercriminals will keep finding new ways to trick employees into giving away corporate data - so businesses need to stay one step ahead. Learn how to spot phishing attacks and why human layer security is your last line of defense against phishing.

Check out some of our videos on phishing

Currently playing

Currently playing

Vlogs from our experts

Law Firms Phishing 555X300 70Pc

How (and why) are law firms targeted by phishing attacks?

Understand the latest methods cybercriminals are using to infiltrate law firms through phishing.

Watch video
Wealth Management Phishing 555X300 70Pc

How (and why) are investment management firms targeted by phishing?

Cybercriminals are targeting wealth management firms - find out how to protect your business. 

Watch vlog

What are ransomware and impersonation attacks...

Ransomware600x400

Ransomware explained: What you need to know

Ransomware attacks don’t just affect the biggest companies. Learn the basics about the threat of ransomware.

Read article
Ransomware2600x400

Can the ransomware epidemic be stopped?

Ransomware is accelerating at an alarming pace. Learn how to break the kill chain and slow it down in our expert guide. 

Read article
Impersonationattack600x400

What is an impersonation attack?

Impersonation is a dangerous phishing tactic. Learn how to recognise and prevent attacks. 

Read article
Top Ransomware Attacks 600X400

2021's top ransomware attacks and need-to-know stats

We've compiled all the biggest ransomware stories and need-to-know statistics for 2021. 

Read article

Top tips and how to identify phishing

Becus600x400

What is business email compromise (BEC)?

Learn how to recognise and prevent business email compromise (BEC). 

Learn more
Businessemail600x400

Three examples of business email compromise (BEC)

Learn about three of the top business email compromise scams from recent years and discover how you can protect your organization with Egress.

Learn more
Becstop600x400

How to stop phishing becoming business email compromise

Don't let a phishing attack turn into business email compromise. Follow our guide on the actions to take if you ever find yourself the victim of phishing. 

Learn more
Reportphishing600x400

How to identify a phishing website

20% of all employees are likely to click on phishing email links and, of those, 67% go on to enter their details on a phishing website.

Learn more
Barrel600x400

What’s “double-barrel phishing” – and should you be concerned?

Double-barrel phishing is a clever phishing tactic - but there are ways to beat it. Find out everything you need to know here.

Learn more
Five600x400

5 Best Defenses Against Phishing Attacks

In this article, we'll explore what phishing is and the methods cybercriminals use to get their hands on sensitive data. Sharing our top tips to help prevent

Learn more
7600X400

Spear phishing attacks: Top 7 signs to watch out for

Spear phishing is a major risk for US businesses. Discover the 7 signs you need to look out for.

Learn more
Toptipspearphish600x400

Preventing spear phishing: What you need to know

Find out everything you need to know about spear phishing attacks and learn how to protect your business. 

Learn more
Ceofraud600x400

How can I stop CEO fraud phishing?

CEO fraud is on the rise - learn how to stop it and keep your business safe. 

Learn more

Expert articles on how to spot phishing emails

Accounttakeover600x400

What is account takeover (ATO)?

What exactly is account takeover? Find out more about this dangerous outcome of phishing and learn how to protect your business.

Read more
Preventaccounttakeover600x400

How to prevent account takeover (ATO)

Learn how to detect (and prevent) account takeover attacks against your business. 

Read more
Spotphishlink600x400

How to spot a phishing link

Find out how to detect a phishing link and stay protected online.

Read more
Cybercrime600x400

A guide to spearphishing

Spear phishing can be seen as a more sophisticated form of phishing. Both kinds of attacks attempt to trick victims into volunteering sensitive, commercially valuable information, predominantly through email.

Read more
Preventphishemail

How to prevent email phishing

Phishing has been around for a long time. The thing is, attackers continue to use it because it’s still very effective. If anything, the number of phishing attempts is increasing, costing enterprise organisations millions of dollars to deal with phishing attacks.

Read more
Dmarc2600x400

Guide to DMARC

DMARC is an email authentication protocol that helps recipient domains verify that an email sender is who they say they are and not a cybercriminal spoofing a domain name.

Read more

Want to read more on other cyber security topics?

Click here