Skip to main content

What is phishing and how to detect it

Phishing is a method that cybercriminals use to trick and get personal information to be revealed.

such as passwords, credit card or social security details, and bank account numbers, among others.

blog phisihing

They obtain this information by sending fraudulent emails or directing the person to a fake website. The most common phishing tactic involves victims receiving an email or text message that imitates or “impersonates” a known and trusted person or organization.

The email contains content that is somewhat convincing or threatening, which creates some doubt in the user and makes them open a file or fill out a form. If the user does as the phishing asks and provides their details on the website, file or form, the information reaches the attacker, who uses it to steal identities, rob bank accounts, and sell personal information on the black market.

The most common form of deception today is via email. However, information can also be obtained through social networks or other platforms, so you need to be very careful.


How to detect a phishing attack?

Recognizing a phishing attempt is not always easy, but some tips, a little discipline and a little common sense can help a lot. We recommend that you look for anything strange or unusual in the content you receive. Ask yourself if the message arouses any suspicion, being guided by intuition and not being led by fear, since phishing attacks often use fear to cloud reasoning.

Below, we will explain some elements or signs that are part of a phishing attempt, in order to help detect it:


  • If you receive an email alerting you to an offer, it makes an offer that seems too good to be true. He could say he has won the lottery, an expensive prize, or something else of very high value.


  • The sender of the message or email is recognized, but it is someone with whom they do not normally deal or communicate. It should also be considered if the content of the email has nothing to do with your regular job responsibilities.


  • The message sounds terrifying. Be careful if the email uses alarmist language to create a sense of urgency, urging you to click and “act now” before your account is deleted. Remember, responsible organizations do not solicit personal details over the internet.


  • The message contains unexpected or strange attachments. These attachments may contain malicious code, ransomware, or some other online threat.


Ref. Blog Brontobyte Cloud – our partner in Backup and Cloud Server solutions


How to act?

Strengthen security measures by updating operating systems, browsers and protection programs to the latest versions.

Configure more restrictive email measures and install protection programs against credential theft.

Implement more restrictive security policies using secure passwords and implementing two-factor authentication if necessary.

Training users to give them the appropriate knowledge about cybersecurity so that they are aware of the dangers and consequences of attacks such as phishing.

Establish action protocols and good practices such as not accessing from email links, being suspicious of shortened links and pop-up windows, leaving any website that does not have an SSL certificate, never sharing credentials, only accessing from secure devices, previously validating any financial transaction by phone…

Also be wary of messages we receive on our mobile phones, smishing (phising via “SMS”) which uses text messages or instant messaging such as WhatsApp to deceive you and get you to take some fraudulent action.

If you suspect you have been the victim of a phishing attack, it is important to gather all possible evidence, file a complaint, and immediately change all passwords. You should contact the affected financial institution to inform them of what has happened, and be on the lookout for unauthorized transactions in your bank account.

At Business Tic Consultoria we can help you design security protocols and implement the most appropriate measures for your company.