{"id":6231,"date":"2025-08-15T12:29:31","date_gmt":"2025-08-15T11:29:31","guid":{"rendered":"https:\/\/amtivo.com\/uk\/standards\/\/\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/"},"modified":"2025-12-15T16:16:07","modified_gmt":"2025-12-15T16:16:07","slug":"how-to-protect-against-phishing-7-tips-for-protecting-your-organisation","status":"publish","type":"standard-post-filter","link":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/","title":{"rendered":"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips"},"content":{"rendered":"<p><em>When people think of cyber security, they tend to think of hacking, but phishing is potentially a far greater threat. That\u2019s because, rather than attempting to hack past security structures, phishers instead focus on a far easier target: tricking members of your organisation into letting them in. Find out more about phishing and how to protect your organisation from this kind of attack.<\/em><\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>What Is Phishing?<\/h2>\r\n<p>Phishing is an attempt to trick someone into taking an action that makes it possible to steal sensitive information from them.<\/p>\r\n<p>Phishing usually takes the form of an email that pretends to be from someone the recipient might trust. This email will encourage the user to share their information, such as directing them to enter their login details on a fraudulent webpage that looks like it belongs to a company the user trusts.<\/p>\r\n<p>Phishing is just one tool amongst a cyber criminal\u2019s \u201csocial engineering\u201d toolkit, but the use of this tool is on the rise. Tricking one of your employees into divulging their login is easier than trying to hack into your customer database. This means that you need to take steps to protect against phishing attacks as part of your information security processes.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Phishing Prevention Best Practices<\/h2>\r\n<p>This isn\u2019t an exhaustive list of measures you can take to prevent your team falling foul of a phishing attack, and there\u2019s no way to guarantee that a phishing attack won\u2019t succeed. Nevertheless, these measures can greatly reduce the risk that a phisher can successfully gain access to the sensitive information held by your organisation.<\/p>\r\n<h3>Implement multi-factor authentication<\/h3>\r\n<p>Also known as two-factor authentication (2FA), this security feature adds an extra step to a login process by requiring the user to provide extra proof of their identity. This proof can take many forms, from providing a code sent to them via text message to inserting a physical security key into their device.<\/p>\r\n<p>This extra layer of authentication means that a phishing attack that successfully gains access to an employee\u2019s login details still can\u2019t access your files unless they also have access to the second method of authentication.<\/p>\r\n<h3>Update devices regularly<\/h3>\r\n<p>Some phishing attacks make use of security flaws discovered in the software running on your device. Software developers issue regular updates to fix these flaws, so make sure that your organisation regularly updates its devices to keep them as protected as possible.<\/p>\r\n<p>Of course, there is concern about maintaining compatibility with other software, so you might not want to install updates as soon as they are available. Part of your risk analyses will account for the risk to your business should a piece of software stop working versus the risk of security vulnerabilities. You may decide to examine the details of each update as they are made available and install them as and when it is appropriate.<\/p>\r\n<h3>Draw a clear line between personal and business devices<\/h3>\r\n<p>Some of your employees may access their work email on their personal devices. While this might seem convenient and cost-effective, a compromised personal device could help a phisher gain access to your organisation\u2019s information.<\/p>\r\n<p>It is best practice to issue employees with dedicated equipment for their work. If this is not practical, ensure that your employees are following your organisation\u2019s information security processes even when using their personal devices. If they are not, you may need to consider restricting remote access while they are on such devices.<\/p>\r\n<h3>Don\u2019t click links in emails<\/h3>\r\n<p>While most of us think of the foreign prince trying to move money out of his country when we think of phishing emails, the truth is that these kinds of attacks have become much more sophisticated. Many phishing emails are indistinguishable from the real thing, copying the design, layout, even the language used by a company in an attempt to get you to visit their fraudulent site.<\/p>\r\n<p>The safest course of action is to avoid clicking links in any emails. Type the company\u2019s URL into your Internet browser manually or finding for them via a search engine. If the message is legitimate, you will often be able to find the page by navigating to it via the website\u2019s homepage.<\/p>\r\n<h3>Watch out for these warning signs<\/h3>\r\n<p>Most phishing attacks will attempt to elicit an emotional response that overrides your rational reaction. If you receive an unexpected email that you find alarming, frightening, or exciting, pause and look past the messages for these warning signs.<\/p>\r\n<ul>\r\n\t<li>The message asks for personal information<\/li>\r\n\t<li>Poor spelling or confusing language<\/li>\r\n\t<li>Low-quality images or logos<\/li>\r\n\t<li>Hovering over a link reveals a URL that doesn\u2019t match the sender\u2019s web address<\/li>\r\n\t<li>The sending email address doesn\u2019t match the company\u2019s web address<\/li>\r\n\t<li>The message doesn\u2019t follow action you took (e.g. lottery win when you didn\u2019t buy a ticket, order confirmation when you didn\u2019t place an order, etc.)<\/li>\r\n\t<li>The message is a threat (e.g. a recording was made of you, your bank account will be closed, etc.)<\/li>\r\n<\/ul>\r\n<p>The <a href=\"https:\/\/www.symantec.com\/en\/uk\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener noreferrer\">most common phishing messages<\/a> are:<\/p>\r\n<ul>\r\n\t<li>A bill<\/li>\r\n\t<li>Email delivery failure<\/li>\r\n\t<li>Parcel delivery<\/li>\r\n\t<li>Legal\/law enforcement<\/li>\r\n\t<li>Scanned document<\/li>\r\n<\/ul>\r\n<p>Watch out too for order confirmations, requests or offers of money, etc. For some real-life examples, take a look at <a href=\"https:\/\/phishingquiz.withgoogle.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">this interactive quiz from Google<\/a> which can help you learn how to identify phishing attacks.<\/p>\r\n<p>If you\u2019re still not sure if the email is legitimate, visit the company\u2019s website by searching for them (do not click any links in the email), and contact them directly. They\u2019ll be able to confirm whether or not the message is the real thing.<\/p>\r\n<h3>Don\u2019t put all your trust in HTTPS<\/h3>\r\n<p>Much has been made about looking for \u201chttps\u201d in web addresses and the padlock icon to confirm the security of a website. But the presence of this security doesn\u2019t rule out a phishing attack.<\/p>\r\n<p>The presence of \u201chttps\u201d in a web address means that the owner of the site has an SSL certificate, which in turn means that any information submitted on that page enjoys extra layers of security. But there\u2019s nothing stopping phishers from getting an SSL certificate for their fraudulent website; your information will be transmitted securely, but it will still be transmitted to the phisher.<\/p>\r\n<p>While you should never submit sensitive information to a website that doesn\u2019t have HTTPS in its web address, you should also make sure you can trust the website itself. Take a close look at the URL for easy-to-miss differences (peypal.com instead of paypal.com, for instance), and if in doubt, contact someone at the company.<\/p>\r\n<h3>Implement an Information Security Management System<\/h3>\r\n<p>These prevention techniques can help prevent a phishing attack on your organisation from being successful, but your approach to information security needs to suit your organisation; there may be measures in this article that aren\u2019t appropriate to your organisation, or solutions that are unique to your organisation. This is why implementing an <a href=\"\/uk\/standards\/iso-27001\/certification\/\">Information Security Management System (ISMS)<\/a> is so beneficial.<\/p>\r\n<p>An ISMS can help you identify the particular information security risks that your organisation is facing and establish clear, defined processes to help mitigate those risks. By following these processes, your employees are less likely to fall prey to a phishing attack and your information will be safer.<\/p>\r\n<h2>\u00a0<\/h2>\r\n<h2>Learn More About The Threat Within<\/h2>\r\n<p>Phishing is just one of the ways that malicious agents use to turn employees into a data security liability. In fact, our recent white paper reveals that <strong>human error was responsible for 88% of data breaches<\/strong> in 2017\/8, with the trend set to continue unless organisations implement stronger data security measures.<\/p>\r\n<p><a href=\"\/uk\/standards\/cyber-essentials\/insights\/why-hackers-arent-the-greatest-threat-to-your-security\/\">Download our free white paper, &#8216;The Invisible Digital Threat&#8217;<\/a> to find out about the true digital threats facing your organisation and learn what you can do to protect yourself.<\/p>","protected":false},"excerpt":{"rendered":"Phishing poses a significant threat to your business because it relies on simple human error. Guard against this type of attack.","protected":false},"author":24,"featured_media":6232,"template":"","meta":{"_acf_changed":false,"_searchwp_excluded":"","footnotes":""},"standard-post-categories":[31],"standard-post-tags":[32],"class_list":["post-6231","standard-post-filter","type-standard-post-filter","status-publish","has-post-thumbnail","hentry","standard-post-categories-insights","standard-post-tags-cyber-essentials"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Reduce Phishing Attacks Within Your Organisation: 7 Top Tips<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips\" \/>\n<meta property=\"og:description\" content=\"Phishing poses a significant threat to your business because it relies on simple human error. Guard against this type of attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Amtivo UK\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-15T16:16:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/Phishing-prevention-e1612975584490.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"475\" \/>\n\t<meta property=\"og:image:height\" content=\"348\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/","og_locale":"en_GB","og_type":"article","og_title":"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips","og_description":"Phishing poses a significant threat to your business because it relies on simple human error. Guard against this type of attack.","og_url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/","og_site_name":"Amtivo UK","article_modified_time":"2025-12-15T16:16:07+00:00","og_image":[{"width":475,"height":348,"url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/Phishing-prevention-e1612975584490.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/04\/testimonialImage-placeholder.jpg","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/","url":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/","name":"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips","isPartOf":{"@id":"https:\/\/amtivo.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/#primaryimage"},"image":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/#primaryimage"},"thumbnailUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/Phishing-prevention-e1612975584490.jpg","datePublished":"2025-08-15T11:29:31+00:00","dateModified":"2025-12-15T16:16:07+00:00","breadcrumb":{"@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/#primaryimage","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/Phishing-prevention-e1612975584490.jpg","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/09\/Phishing-prevention-e1612975584490.jpg","width":475,"height":348,"caption":"Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/insights\/how-to-protect-against-phishing-7-tips-for-protecting-your-organisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/amtivo.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Standards","item":"https:\/\/amtivo.com\/uk\/standards\/"},{"@type":"ListItem","position":3,"name":"Cyber Essentials","item":"https:\/\/amtivo.com\/uk\/standards\/cyber-essentials\/"},{"@type":"ListItem","position":4,"name":"Insights","item":"https:\/\/amtivo.com\/uk\/standards\/insights\/"},{"@type":"ListItem","position":5,"name":"Reduce Phishing Attacks Within Your Organisation: 7 Top Tips"}]},{"@type":"WebSite","@id":"https:\/\/amtivo.com\/uk\/#website","url":"https:\/\/amtivo.com\/uk\/","name":"Amtivo","description":"","publisher":{"@id":"https:\/\/amtivo.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/amtivo.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/amtivo.com\/uk\/#organization","name":"Amtivo","url":"https:\/\/amtivo.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","contentUrl":"https:\/\/amtivo.com\/uk\/wp-content\/uploads\/sites\/20\/2025\/10\/cropped-BAB-Amtivo-Joint-Logo-Updated-300ppi.png","width":371,"height":203,"caption":"Amtivo"},"image":{"@id":"https:\/\/amtivo.com\/uk\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6231","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter"}],"about":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/types\/standard-post-filter"}],"author":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/users\/24"}],"version-history":[{"count":5,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6231\/revisions"}],"predecessor-version":[{"id":7011,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-filter\/6231\/revisions\/7011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media\/6232"}],"wp:attachment":[{"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/media?parent=6231"}],"wp:term":[{"taxonomy":"standard-post-categories","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-categories?post=6231"},{"taxonomy":"standard-post-tags","embeddable":true,"href":"https:\/\/amtivo.com\/uk\/wp-json\/wp\/v2\/standard-post-tags?post=6231"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}