Back to contents

Phishing

Cybercriminals will keep finding new ways to trick employees into giving away corporate data - so businesses need to stay one step ahead. Learn how to spot phishing attacks and why human layer security is your best line of defence against phishing.

Threat Intelligence

1432 Fighting Phishing Report Web Imagery Marketing Content 555X300 17kb

Fighting Phishing Report

From ransomware to payment scams, the risk of phishing continues to rise.  In our new report, we detail the percentage of businesses that have purchased cyber security insurance, invested in forensic investigation, and retained legal counsel to combat phishing attacks.  Read first-hand responses from IT leaders on their personal experiences with phishing attacks.

Read article
Linkedinphishing 600x400 10kb

LinkedIn phishing attacks up 232% in February

See the new email phishing attacks that use display name spoofing and stylized templates to impersonate LinkedIn and harvest victims’ credentials.

Read article
Ukraine 600x400 17kb

Businesses warned to boost cyber defenses due to Ukraine tensions

After a week of diplomatic discussions over the ongoing tensions in Ukraine, cybersecurity concerns have come to the fore. Regulators have strongly advised businesses to improve cybersecurity in the face of potential attacks.

Read article

Top tips on how to prevent phishing

Anti Phishing Training 600X400

Why anti-phishing training needs augmenting with intelligent tech

Learn how to make your organization's training efforts more successful by creating real-time teachable moments with intelligent tech. 

Read article
Office 600X400

Who are the top phishing targets in an organization?

Discover what our survey data shows about who cybercriminals are targeting with attacks.

Read article
Zero 600X400 29Kb

What is a zero-day phishing attack?

Is your traditional email security solution protecting your company's communications? Zero-day attacks exploit these solutions, but protection is available.

Read article
No Forbidden Zero Trust 600X400 43Kb

Why is zero-trust so important in cybersecurity?

Learn more about zero trust for email and why it's the best line of defense against sophisticated cyber attackers.

Read article
Natural Language Processing Code 600X400 40kb

Natural language processing (NLP) explained

Natural language processing is a computer science and AI methodology for helping computers understand written and spoken language.

Read article
Anti Phishing Solution 600X400

What makes an anti-phishing solution intelligent?

Many solutions on the market claim to be intelligent. Find out how to tell whether they really are. 

Read article
Top Ransomware Attacks 600X400

2021's top ransomware attacks and need-to-know stats

We've compiled all the biggest ransomware stories and need-to-know statistics for 2021. 

Read article
Statistics2021600x400

Must know phishing statistics for 2021

Arm yourself with the need-to-know facts and statistics about phishing in 2021. 

Read article
Biasmachinelearn555x300

Bias and phishing: How machine learning can protect us

Egress DPO Kevin Tunison shares how to address the difficult (and often overlooked) issue of bias and cybersecurity.

Read article
Working Laptop Human 600X400 38Kb

Human layer security: Your last line of defence against phishing

When phishing attacks get through, people are your last line of defence. Find out how to reinforce them. 

Read article
Five 600x400 23kb

5 Best Defenses Against Phishing Attacks

In this article, we'll explore what phishing is and the methods cybercriminals use to get their hands on sensitive data. Sharing our top tips to help prevent

Read article
Reportphishing600x400

How to identify a phishing website

20% of all employees are likely to click on phishing email links and, of those, 67% go on to enter their details on a phishing website.

Read article
Spot phish link hack city 600x400 23kb

How to spot a phishing link

Find out how to detect a phishing link and stay protected online.

Read article
Stoppeopleclickingphishinglink600x400

Can you stop people clicking on links in phishing emails?

All that training and people still click on phishing links... Here's how to finally stop them. 

Read article
Phishingpreventiondevices600x400

How to stop phishing: The power to bulk remove emails from inboxes

Prefer to bulk remove emails from inboxes or use them for real-time education? Learn how to do both with Egress Defend. 

Read article
Devices600x400

Stop phishing emails across all devices: Mobile, desktop, web and tablet

Find out how Egress Defend protects your people from advanced phishing threats on any device. 

Read article
Clickingphishinglink600x400

What happens if I click a phishing link?

If the worst case happens and you end clicking on a phishing link, it's vital to know the goals of the cybercriminals behind the phishing email.

Read article
Hlslast600x400

Human layer security: Your last line of defence against phishing

When phishing attacks get through, people are your last line of defence. Find out how to reinforce them. 

Read article

Phishing attack examples

Legal IT Leaders 600X400

How are legal IT leaders responding to phishing threats?

Learn why legal organizations are widely targeted by cybercriminals, the percentage of businesses paying out, and how legal IT leaders can effectively respond to phishing threats. 

Read article
Responding To Phishing Attack 600X400

How are IT leaders responding to ransomware?

Learn how IT leaders are responding to the potentially devastating impact of ransomware.

Read article
Invoice Fraud Dollars600x400

Invoice fraud: Everything you need to know

Invoice fraud is an effective cyberattack to which nearly half of all businesses fall victim. We've outlined what to keep in mind and the intelligent email security tools you can deploy to protect yourself. 

Read article
Workdayphishingattackexamplep1600x400

Human cost of phishing: A workday attack example Part 1

The cost of a phishing attack isn't only counted in financial terms. Find out what happens to the humans behind a breach.

Read article
Workdayphishingattackexamplep2600x400

Human cost of phishing: A workday attack example Part 2

Find out what happened to the rest of our characters after disaster struck a fictional law firm. 

Read article
Investmentmanagement555x370 40Kb

How (and why) are investment management firms targeted by phishing?

Cybercriminals are targeting wealth management firms - find out how to protect your business. 

Read article
Compliance Legal 600X400 26kb

How (and why) are law firms targeted by phishing attacks?

Understand the latest methods cybercriminals are using to infiltrate law firms through phishing.

Read article

Email Hacks & Scams

Black Friday Scam 358X193

Holiday phishing season: Your guide to staying scam-safe

Learn how to stay safe from scams and phishing kits this holiday season in our expert guide.

Read article
FBI Hack 358X193

FBI email hack highlights danger of account takeover

Get the full picture on how the FBI's email was hacked - and why we're lucky the outcome wasn't more serious.

Read article
Encryptionmicrosoftemails555x300

What you need to know about the Microsoft Exchange hack

Cut through the noise and get key information about the Microsoft Exchange vulnerabilities

Read article
7 seven 600X400 12kb

Seven new (and convincing!) phishing scams to watch out for

Learn what to watch out for in seven recent phishing scams that we've seen doing the rounds.

Read article
Chain555x300

Supply chain attacks: Who’s your weakest link?

Your cybersecurity weak link might not be within your own business. Understand the landscape of supply chain attacks and how to protect yourself.

Read article
Jemaildlp555x300

Email hacking: Could you be next?

Will it continue to dominate business processes? Or will it be replaced? Are the security concerns around email really as big as many industry analysts claim?

Read article
Cryptojacking Bitcoin 358X193

Laptop running slow? You might have been cryptojacked.

Find out whether there could be something more sinister behind your latest tech troubles. 

Read article

Ransomware

Ransomwareandphishing600x400

How does phishing lead to ransomware attacks?

Learn how to prevent your business from falling victim to ransomware via phishing.

Read article
Ransomware2600x400

What is ransomware?

Worried about ransomware? Here's what you need to know about the threat of ransomware and how to protect your business. 

Read article
Top Ransomware Attacks 600X400

Ransomware: 2021's top attacks and need-to-know stats

We've compiled all the biggest ransomware stories and need-to-know statistics for 2021. 

Read article
Padlockkeyboard600x400

How to stop the rising tide of ransomware

Ransomware is running wild right now. Read our latest guide on how to make sure you're not caught up in the chaos.

Read article
Healthcare600x400

Why is healthcare such a big target for ransomware?

Understand why healthcare organisations are major targets for ransomware attacks and learn how they can protect themselves. 

Read article
Skull Killware 600X400 15Kb

First ransomware, now killware. Can it be stopped?

Killware is ransomware turned deadly and is fast becoming a serious threat. Learn what is, how it works and whether enough is being done to stop it. 

Read article
Hack 600X400 20Kb

How cybercriminals work together to take down your organisation

Find out how cybercriminals are working together to share knowledge and boost the success of their attacks. 

Watch vlog
Chain555x300

Killing the kill chain: Stop phishing and you'll stop ransomware

Killing the kill chain: Stop phishing and you'll stop ransomware

Watch vlog
Insurance Money 600X400 33Kb

Will insurance firms stop paying out for ransomware attacks?

Hear from Egress Threat Intelligence VP Jack Chapman on why insurance companies are rethinking their policies around ransomware attacks

Watch vlog
US Legal Building 358X193

Can new US cybersecurity bills slow the rise of ransomware?

Ransomware is running wild. Will eight new cybersecurity bills aiming to protect US critical infrastructure be enough to slow it down?

Read article
Phone 600X400 37Kb

Can the ransomware epidemic be stopped?

Ransomware is accelerating at an alarming pace. Learn how to break the kill chain and slow it down. 

Read article
Money Ransom 600X400 34Kb

Ransomware explained: What you need to know

Ransomware attacks don’t just affect the biggest companies. Learn the basics about the threat of ransomware.

Read article

What is phishing

Microsoft Email Scams 600X400

Microsoft 365 email scams to watch out for

Learn the latest phishing tactics cybercriminals are using to target Microsoft 365 users.

Read article
7 seven 600X400 12kb

Seven signs of a phishing email

Don't get caught out! Learn the seven most common signs that you've been targeted by a phishing email. 

Read article
Question mark 600x400 18kb

Been phished? Here’s what to do right now

Have you fallen victim to a phishing attack? In this article, we explain what to do if you click on a phishing link to minimise the potential threat.

Read article
Reportphishing600x400

How to report a phishing email

One in every 3,722 emails in the UK is a phishing attempt. That's why it's essential to report any suspicious emails that come your way. Here's some tips on how

Read article
Preventphishemail 396X264 25Kb

How to spot a phishing email?

Check out our infographic for a 101 on the different types of phishing emails and how to spot one when it lands in your inbox.

Read article
Advancedphishingthreat600x400

Help insiders to stop advanced phishing threats

Start considering phishing as an insider threat and boost your chances of beating it.

Read article
Psychology600x400

The psychology of social engineering and phishing

Why do we fall for phishing? Understand the psychological triggers cybercriminals use - and learn how to use that knowledge against them.

Read article
Phishing Computer 396X264 18Kb

How to prevent email phishing

Phishing has been around for a long time. The thing is, attackers continue to use it because it’s still very effective. If anything, the number of phishing attempts is increasing, costing enterprise organisations millions of dollars to deal with phishing attacks.

Read article
Dmarc data microchip 600x400 40kb

Guide to DMARC

DMARC is an email authentication protocol that helps recipient domains verify that an email sender is who they say they are and not a cybercriminal spoofing a domain name.

Read article

Different types of phishing

Spearphishingemployeeprevent600x400

How spear phishing attacks catch employees out

Learn the tactics cybercriminals use to trick employees into interacting with phishing emails. 

Read article
Smishing Quishing Vishing Scams 600X400

What are smishing, vishing, and quishing scams?

You've heard of phishing - now learn about the scams that arrive via SMS, voice call, and QR code. 

Read article
Spam Vs Scam Email 600X400

What’s the difference between spam and scam emails?

Spam emails can definitely be annoying - but they have some key differences with phishing scams.

Read article
Deepfake600x400

Deepfake phishing: Should we be concerned?

We're expecting deepfakes to become a growing trend in phishing attacks. Here's what you need to know.

Read article
Cybercrime396x264 32Kb

A guide to spearphishing

Spear phishing can be seen as a more sophisticated form of phishing. Both kinds of attacks attempt to trick victims into volunteering sensitive, commercially valuable information, predominantly through email.

Read article
Five 600x400 23kb

Five top tips to avoid spear phishing attacks

Discover our top five tips for protecting your business from spear phishing attacks.

Read article
Whaling600x400

What exactly is whaling?

What is a whaling attack, and how can you avoid it? Here's all you need to know.

Read article
7 seven 600X400 12kb

Spear phishing attacks: Top 7 signs to watch out for

Spear phishing is a major risk for US businesses. Discover the 7 signs you need to look out for.

Read article
Barrel600x400

What’s “double-barrel phishing” – and should you be concerned?

Double-barrel phishing is a clever phishing tactic - but there are ways to beat it. Find out everything you need to know here.

Read article

Business Email Compromise (BEC)

Bec600x400

What is a business email compromise attack?

Learn how to recognise and prevent business email compromise in this expert guide from Egress.

Read article
Goalbec600x400

What's the goal of business email compromise (BEC)?

Learn what makes business email compromise such a lucrative form of phishing for cybercriminals. 

Read article
Three600x400

Three things to do after a business email compromise attack

Don't let business email compromise bring your business down. Here are three key actions to take straight away if it strikes.

Read article
Becstop600x400

How to stop phishing becoming business email compromise

Don't let a phishing attack turn into business email compromise. Follow our guide on the actions to take if you ever find yourself the victim of phishing. 

Read article
Bec600x400

Three examples of business email compromise attacks

We've picked out three real-life examples that prove just how dangerous BEC can be. 

Read article
Businessemail600x400

Three examples of business email compromise (BEC)

Learn about three of the top business email compromise scams from recent years and discover how you can protect your organization with Egress.

Read article
Becus600x400

What is business email compromise (BEC)?

Learn how to recognise and prevent business email compromise (BEC). 

Read article

Account takeover, CEO fraud & Impersonation attacks

Brandimpersonation600x400 8kb

How do brand impersonation phishing attacks work?

Brand impersonation attacks are on the rise – learn how they work and how to spot them. 

Read article
Accounttakeoverdanger600x400

Why are account takeover attacks so dangerous?

Learn what makes account takeover so dangerous compared to other email-based cyberattacks.

Read article
Accounttakeover600x400

Account takeover: Everything you need to know

Account takeover is a dangerous outcome of phishing. Find out what you need to know to stay safe. 

Read article
Bec600x400

How to prevent account takeover (ATO)

Learn how to detect (and prevent) account takeover attacks against your business. 

Read article
Ceofraud600x400

Impersonating executives: A dangerous phishing tactic

Cybercriminals are impersonating executives to get into your inbox. Learn more about how CEO fraud works.

Read article
Toptipspearphish600x400

How to recognise and prevent impersonation attacks

Impersonation is a dangerous phishing tactic. Learn how to spot and prevent attacks before they lead to a serious breach. 

Read article
Ceofraudx2x600x400

CEO fraud attacks and how to stop them

CEO fraud is a growing problem - learn how to spot the signs and protect yourself from attacks. 

Read article
Help 600X400 35Kb

Why social graphs won’t save you from account takeover attacks

Social graphs are a valuable tool - but you need more to stay safe from account takeover attacks.

Read article
Accounttakeoverdanger600x400

How account takeover (ATO) attacks happen

Account takeover (ATO) attacks cause serious damage before they're detected - learn how they start. 

Read article
Ceofraud600x400

How can I stop CEO fraud phishing?

CEO fraud is on the rise - learn how to stop it and keep your business safe. 

Read article
Impersonationattack600x400

What is an impersonation attack?

Impersonation is a dangerous phishing tactic. Learn how to recognise and prevent attacks. 

Read article
Accounttakeover600x400

What is account takeover (ATO)?

What exactly is account takeover? Find out more about this dangerous outcome of phishing and learn how to protect your business.

Read article

Vlogs & Podcasts

OFFSET Vlog Hit By Hackers 600X400 40Kb

Hit by hackers? You’re now a target for more attacks

Hear from Egress Threat Intelligence VP Jack Chapman on why hackers are likely to come back for more.

Watch vlog
OFFSET Vlog Cyberattack Landscape 600X400 40Kb

How the cyberattack landscape has accelerated beyond the cybersecurity market

Hear from Egress Threat Intelligence VP Jack Chapman on how criminals are exploiting the digital landscape.

Watch vlog
OFFSET Vlog Crime As A Service 600X400 41Kb

Crime-as-a-service: How anyone can become a hacker

Hear from Egress Threat Intelligence VP Jack Chapman on how anyone can become a hacker.

Watch vlog
OFFSET Podcast Hit By Hackers 600X400 40Kb

Hit by hackers: Are you next in line for a phishing attack?

Hear from Egress CEO Tony Pepper about how attacks are becoming more sophisticated, why traditional defences are failing to stop phishing, and what you can do to protect your business. 

Listen to podcast

What does phishing mean...

Cybersecurity information hub

Find the answers you need from our bank of first-hand research and thought leadership.

Visit cybersecurity information hub