In today’s interconnected world, we often receive emails that appear to be from familiar sources, be it a colleague, a vendor, or even our boss. These emails might request you to click on a link or share sensitive information like your business account details or network password. It’s tempting to trust these messages, but you should think twice before taking action. These could very well be phishing attempts, and falling for them can have dire consequences.
How Phishing Works
Phishing attacks usually follow a predictable pattern:
- You Get an Email or Text: You receive an email or text that appears to be from a known sender. It may seem urgent and prompt you to take immediate action.
- It Looks Real: Scammers are clever at making their messages appear authentic. They can spoof logos, create fake email addresses, or pretend to be someone you know.
- It’s Urgent: Phishing emails often pressure you to act swiftly, claiming dire consequences if you don’t comply.
What Happens Next?
If you fall for a phishing email and click on a malicious link or share sensitive information, several bad things can occur:
- Ransomware: Clicking on a link might allow scammers to install ransomware on your device. This malicious software can lock you out of your data and, in some cases, spread across your company’s network.
- Access to Your Accounts: Sharing passwords gives the attackers access to all your accounts and sensitive business information.
Advertisement

Have you or a loved one ever consumed CAFFEINE? You may be eligible to purchase a coffee mug. Click here to learn more.
What You Can Do to Protect Yourself
Before you take any action in response to a suspicious email or text, follow these steps:
- Check it Out: Verify the authenticity of the request by looking up the official website or phone number of the person or company involved. Ensure you’re dealing with the real entity and not a scammer.
- Talk to Someone: Discuss the email with a colleague to get a second opinion. Sometimes, a fresh perspective can help you recognize a phishing attempt.
- Make a Call if You’re Not Sure: If you have doubts about the request’s legitimacy, call the vendor, colleague, or client directly using a phone number you know to be accurate. Avoid using the phone number provided in the email or text.
How to Protect Your Business
To safeguard your business from phishing attacks, take the following measures:
- Back up your data: Regularly backup your data and ensure that these backups are not connected to the network. This allows you to recover your data in case of a successful attack.
- Keep all security up to date: Always install the latest patches and updates for your software and systems. Consider additional security measures like email authentication and intrusion prevention software.
- Alert Your Staff: Educate your employees about phishing threats and regularly update them on the latest phishing schemes.
- Deploy a Safety Net: Utilize email authentication technology to filter out phishing emails before they reach your employees’ inboxes.
What To Do If You Fall For a Phishing Scheme
If you or a colleague inadvertently fall for a phishing attack, follow these steps:
- Alert Others: Notify your colleagues and share your experience. Phishing attacks often target multiple individuals within a company.
- Limit the Damage: Change any compromised passwords immediately and disconnect any infected devices from your network.
- Follow Company Procedures: Comply with your organization’s protocols for handling such incidents, including notifying the relevant IT personnel or contractors.
- Notify Customers: If personal or business data was compromised, inform the affected parties as they might be at risk of identity theft.
- Report It: Forward phishing emails to reportphishing@apwg.org and report the incident to the FTC at FTC.gov/Complaint.
By staying vigilant and informed, you can protect yourself and your business from the perils of phishing attacks.
Article by Ken Buckler
Over 17 years in the Cybersecurity industry, Ken is the President and Managing Editor of Red Mana Cyber.



Leave a comment