What Are the Best Ways to Identify & Combat Phishing Attacks?

In 2019, 65% of all U.S. organizations were victims of a successful phishing attack. Phishing is a global threat that only continues to get worse each year.


Phishing continues to be the #1 delivery method for malware and cyberattacks of all types because it’s low cost and effective. Criminal scan send out millions of phishing emails around the world for just pennies and it only takes a small percentage of users to be fooled for the hacker to come out ahead.


Without the right email security measures, users have few defenses against increasingly sophisticated threats. Phishing scammers will create elaborate spoofed websites designed to mimic that of a well-known company and send emails identical to the real thing.


Phishing is costly to businesses in a number of ways because it’s used to perpetrate multiple types of attacks, including:


·        Credential theft

·        Ransomware

·        Viruses

·        Trojans

·        Spyware

·        Data Breaches

·        Banking Theft

·        Credit Card Fraud

·        Identify Theft

·        and more


A single phishing email can mean a cost of $100,000 for a small business. Costs come from things like downtime, lost productivity, loss of customers, malware removal, recovery costs, and lost reputation.


If you think of different types of attacks as different bullets that can cause damage in a variety of ways, phishing would be the weapon that could deliver any of them. This makes it an especially critical cybersecurity threat to address.


There are two main ways to address phishing, one is through user identification of phishing, so they aren’t fooled. The other is through technology safeguards that can keep systems safe from phishing threats.

Tips for User Identification of Phishing


Hover Over Links Without Clicking Them


Users should get in the habit of hovering over any email link without clicking it to reveal the real URL. This is often a way to immediately identify phishing scams because the link that pops up won’t match what the email purports to be.

amazon pop up phishing scam


Look for Any Copycat Domains


Phishing scammers will often purchase copycat domains that are close to a popular organization. They’re often hoping a user won’t notice the difference between “gatesorganization.org” and “gatesorganzation.org”(misspelled).


They’ll then use these to host spoofed websites designed to trick users into logging into a fake site.


Carefully look over any domains and email addresses contained in emails for any slight variations or misspellings.


View the Source Code of a Message (Don’t Trust the “From”Address)


Many users get fooled by a tactic called email spoofing.


For example: You receive an email stating it’s from your hosting company and you need to update a billing address to prevent your website from being taken offline. You’re suspicious, but you look at the “From”address and it has the domain of your hosting company, so you trust it to be real. You click a link and are taken to a sign-in page that looks familiar, but as soon as you sign in, your web server is hacked because it was all a phishing scam.


Email spoofing is when a scammer puts a different email in the “From” line of a message than the one that actually sent the email. This is why you should never trust the sender’s address.


Instead, view the source code of the email and look for any other email addresses in the sending path. This can often reveal a phishing scam.

Technology Safeguards to Prevent Phishing


It’s important for users to know how to identify phishing,but they’re only human. People need technology safeguards to back them up when it comes to the dangerous threat posed by phishing.


Email Phishing Identification

Wouldn’t it be nice if phishing messages came in with a warning attached so users could easily tell them from safe emails? That’s exactly what eMailAde does! It tags incoming emails for users as “Safe,” “Caution,” or “Danger”.


This removes the chance for human error in identifying phishing and keeps your business more protected against threats.


Antivirus/Anti-Malware on All Devices


Make sure that all devices, including mobile, have a reliable antivirus/anti-malware program that can identify and quarantine any potential threat that may come from a phishing email.


Mobile devices are now used in many offices more than computers, this includes being used to open email, so you want to make sure they’re protected.


Use Email Authentication to Prevent Spoofing


You can prevent your own company’s domain from being spoofed in a phishing attack by putting email authentication in place on your email server. This involves using three protocols (SPF, DKIM, DMARC) that check to ensure servers sending messages using your domain in the “From” line are actually authorized to send your email.

Keep Phishing in Check with eMailAde Inbox Protection!


eMailAde gives your users an immediate alert about a potentially dangerous email, so they can spot phishing right away!


You can download eMailAde Outlook for Windows right now and try it free for 30 days (no credit card required). It’s fast to install and it can start protecting your business from phishing within 5 minutes!


DownloadeMailAde today!






References linked to: