Back to contents

Phishing

Cybercriminals will keep finding new ways to trick employees into giving away corporate data - so businesses need to stay one step ahead. Learn how to spot phishing attacks and why human layer security is your best line of defence against phishing.

What is phishing

Microsoft Email Scams 600X400

Microsoft 365 email scams to watch out for

Learn the latest phishing tactics cybercriminals are using to target Microsoft 365 users.

Read article
7600X400

Seven signs of a phishing email

Don't get caught out! Learn the seven most common signs that you've been targeted by a phishing email. 

Read article
Questionmark600x400

Been phished? Here’s what to do right now

Have you fallen victim to a phishing attack? In this article, we explain what to do if you click on a phishing link to minimise the potential threat.

Read article
Reportphishing600x400

How to report a phishing email

One in every 3,722 emails in the UK is a phishing attempt. That's why it's essential to report any suspicious emails that come your way. Here's some tips on how

Read article
Preventphishemail 396X264 25Kb

How to spot a phishing email?

Check out our infographic for a 101 on the different types of phishing emails and how to spot one when it lands in your inbox.

Read article
Advancedphishingthreat600x400

Help insiders to stop advanced phishing threats

Start considering phishing as an insider threat and boost your chances of beating it.

Read article
Psychology600x400

The psychology of social engineering and phishing

Why do we fall for phishing? Understand the psychological triggers cybercriminals use - and learn how to use that knowledge against them.

Read article
Phishing Computer 396X264 18Kb

How to prevent email phishing

Phishing has been around for a long time. The thing is, attackers continue to use it because it’s still very effective. If anything, the number of phishing attempts is increasing, costing enterprise organisations millions of dollars to deal with phishing attacks.

Read article

Different types of phishing

Smishing Quishing Vishing Scams 600X400

What are smishing, vishing, and quishing scams?

You've heard of phishing - now learn about the scams that arrive via SMS, voice call, and QR code. 

Read article
Spam Vs Scam Email 600X400

What’s the difference between spam and scam emails?

Spam emails can definitely be annoying - but they have some key differences with phishing scams.

Read article
Deepfake600x400

Deepfake phishing: Should we be concerned?

We're expecting deepfakes to become a growing trend in phishing attacks. Here's what you need to know.

Read article
Cybercrime396x264 32Kb

A guide to spearphishing

Spear phishing can be seen as a more sophisticated form of phishing. Both kinds of attacks attempt to trick victims into volunteering sensitive, commercially valuable information, predominantly through email.

Read article
Five600x400

Five top tips to avoid spear phishing attacks

Discover our top five tips for protecting your business from spear phishing attacks.

Read article
Whaling600x400

What exactly is whaling?

What is a whaling attack, and how can you avoid it? Here's all you need to know.

Read article

Phishing attack examples

Workdayphishingattackexamplep1600x400

Human cost of phishing: A workday attack example Part 1

The cost of a phishing attack isn't only counted in financial terms. Find out what happens to the humans behind a breach.

Read article
Workdayphishingattackexamplep2600x400

Human cost of phishing: A workday attack example Part 2

Find out what happened to the rest of our characters after disaster struck a fictional law firm. 

Read article

Ransomware

Ransomwareandphishing600x400

How does phishing lead to ransomware attacks?

Learn how to prevent your business from falling victim to ransomware via phishing.

Read article
Ransomware2600x400

What is ransomware?

Worried about ransomware? Here's what you need to know about the threat of ransomware and how to protect your business. 

Read article
Top Ransomware Attacks 600X400

Ransomware: 2021's top attacks and need-to-know stats

We've compiled all the biggest ransomware stories and need-to-know statistics for 2021. 

Padlockkeyboard600x400

How to stop the rising tide of ransomware

Ransomware is running wild right now. Read our latest guide on how to make sure you're not caught up in the chaos.

Read article
Healthcare600x400

Why is healthcare such a big target for ransomware?

Understand why healthcare organisations are major targets for ransomware attacks and learn how they can protect themselves. 

Read article

Business Email Compromise (BEC)

Bec600x400

What is a business email compromise attack?

Learn how to recognise and prevent business email compromise in this expert guide from Egress.

Read article
Goalbec600x400

What's the goal of business email compromise (BEC)?

Learn what makes business email compromise such a lucrative form of phishing for cybercriminals. 

Read article
Three600x400

Three things to do after a business email compromise attack

Don't let business email compromise bring your business down. Here are three key actions to take straight away if it strikes.

Read article

Account takeover, CEO fraud & Impersonation attacks

Accounttakeover600x400

Account takeover: Everything you need to know

Account takeover is a dangerous outcome of phishing. Find out what you need to know to stay safe. 

Read article
Bec600x400

How to prevent account takeover (ATO)

Learn how to detect (and prevent) account takeover attacks against your business. 

Read article
Ceofraud600x400

Impersonating executives: A dangerous phishing tactic

Cybercriminals are impersonating executives to get into your inbox. Learn more about how CEO fraud works.

Read article
Toptipspearphish600x400

How to recognise and prevent impersonation attacks

Impersonation is a dangerous phishing tactic. Learn how to spot and prevent attacks before they lead to a serious breach. 

Read article
Ceofraudx2x600x400

CEO fraud attacks and how to stop them

CEO fraud is a growing problem - learn how to spot the signs and protect yourself from attacks. 

Read article

What does phishing mean...

Want to read more on other cyber security topics?

Click here