• Home
  • Managed Security
    • Managed Security
    • Managed Detection and Response
    • Security as a Service
  • Services
    • Cyber Risk and Technical Assurance
      • Segmentation and Zero Trust
      • Penetration Testing
      • Infrastructure security assessment
      • Secure Architecture Development
  • About Us
  • Resources
    • Cyber Security Blog
    • Case Studies
    • Cyber Security FAQs
  • Contact Us
  • Menu Menu

Phishing Attacks: What Exactly Are They?

Cyber Attacks

Phishing attacks… you have probably heard of them, but do you really know what they are and how they can affect your business?

What are phishing attacks?

Phishing attacks are one of the most widespread ways cyber criminals use to attack Australian businesses. Scammers will use email, text messages, social media, phone calls or instant messenger apps to deceive you into giving away your personal details.

They may trick you into giving away your passwords, personal security numbers, user data, login details and credit card numbers. Once they have this information, typically when a user clicks on a malicious link, the scammers can gain access to your bank accounts, email accounts and any other accounts that could be financially beneficial to them.

Attackers can use this information to commit identity fraud, make unauthorised payments or steal money from your bank account. Phishing attacks can be extremely devastating to small businesses, as well as individuals and as we have seen, cyber crime is on the rise in 2020.

How do Phishing Attacks Work?

Emails and messages from these cyber criminals can look extremely convincing and will replicate messages you generally receive from banks, online shopping sites, credit card companies, and other companies you trust.

These messages will usually have the same look and feel to the real thing, often replicating the same font, presentation, logos, and wording used by a legit company. They will frequently involve some sort of call to action from the unsuspecting user, that is ‘urgent’, leaving individuals unknowingly giving away personal information or money.

Typical wording for phishing attacks include:

  • There is a problem with your payment information or account details
  • Suspicious activity has been noticed on your account, click to update your details
  • Fake payment requests or invoices
  • Your personal information needs to be updated
  • You have won in a free prize draw
  • There is a problem with your subscription billing information

phishing attacks hacker

What is Spear Phishing?

Spear phishing is a more advanced technique than general phishing attacks, which target the masses and are sent out to random unsuspecting users. Spear phishing will target a specific person or organisation, using targeted knowledge and research about the company’s structure and way of working.

Scammers will identify and target high-valued individuals within an enterprise, using methods such as researching annual reports, press releases, shareholder information, social media sites and other publicly available information.

The attacker will send a fake email to employees, posing as the director for example, that could trick the recipient into sending over a payment or logging in to a secure password protected document. The style of writing, font and company’s logo will all look extremely convincing, leading to data being compromised and scammers having access to sensitive information.

Across the media, cyber attacks on small and medium enterprises (SME’s) is on the rise, particularly during the COVID-19 pandemic, where scammers are taking increasing advantage. Since the start of the outbreak the Government’s Scamwatch has obtained 3060 reported scams, in relation to coronavirus, with losses of over $1,371,000.

phishing attacks padlock graphic

Cyber security tips for individuals

Cyber security is just as important, whether at work, home or on the go. Tips for individuals to help protect yourself form the most common cyber attacks include:

  • Reduce the amount of personal information there is about yourself or your friends and family as much as possible. Only give out personal details if you really have to and to companies you can be sure to trust.
  • Password protect all your devices and do not allow others (you do not know well enough) to access your computer or laptop.
  • Turning on two-factor authentication (2FA) is a great way to reduce the risk of cyber crime. This will ask you for two ways to authenticate your account whilst logging in. For example, a password and a code that is sent to your phone.
  • Be aware of possible fraudulent emails and do not click on links in an email to update your information, always go directly to the main website.
  • Check the full email address of who is sending you the email. These addresses can look obviously spammy or can look quite realistic, double check if you have suspicions.
  • If shopping online, research seller websites that appear to be selling products at rates surprisingly cheap, or of companies you have not heard of/ used before.
  • Change passwords regularly and update old passwords.
  • Be careful when using public Wi-Fi, as the connections are not secure, and people may be able to see what you are doing.
  • Keep your devices and software up to date.

Preventing phishing attacks on small and medium businesses

SME’s often underestimate the need for cyber security until it is too late. Here are some steps to help small and medium businesses protect their organisation from phishing attacks.

  • Two-factor authentication (2FA) is one of the best ways for stopping phishing attacks in their tracks. It provides an added layer of protection when logging in to documents and systems that hold sensitive information.
  • Educating staff members on cyber security and preventive measures can limit of opportunity for employees to be tricked into giving away secure information.
  • Ensure all employee passwords are strong, changed regularly and people are not using the same password for multiple functions.
  • Invest in a complete security software system.
  • Keep regular backups of company data and information.

 

Phishing attack protection from Cube Cyber

Here at Cube Cyber, we offer cost effective advanced security solutions for small to large sized businesses.

We use Cisco Email Security with Advanced Malware Protection (AMP), which blocks spam, phishing emails and malicious email attachments and websites.

Our Next Generation Firewall service offers malware and intrusion protection, website filtering, network activating and log retention, 24/7 incident response, and more.

If you are looking to install advanced protection for your business, update an older system or would simply like a quote, please get in touch with us today. You can also try our free 21-day trial for your business.

December 9, 2020/by Sam Topping
Share this entry
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn
  • Share by Mail
https://cubecyber.com/wp-content/uploads/2020/12/hand-on-computer-mouse-2048x1365-1.jpg 1365 2048 Sam Topping http://cubecyber.com/wp-content/uploads/2023/01/cubecyberlogo-top.svg Sam Topping2020-12-09 03:55:212022-11-24 11:06:53Phishing Attacks: What Exactly Are They?

Quick Search

Latest Insights

  • SASE – Secure Access Service Edge: A Simple OverviewApril 21, 2022 - 11:01 pm

    Over the past couple of years businesses and corporations have had to quickly adjust to a significant increase in employees working from home. With increasing data coming from online sources into corporate networks, more SaaS apps being adopted and new types of traffic taking up increasing bandwidth (videos, collaboration, and shared editing of online documents), […]

  • Beginners Guide to Cloud Computing & How it Can Help Small BusinessesMay 13, 2021 - 5:16 am

    With more businesses working from home, it may be time to invest in cloud computing for your company. In fact, it is more than likely you are already using some form of cloud computing. If you have ever used Dropbox or Google Docs, as two examples, then you are already familiar with working from cloud-based […]

  • Top 7 Cyber Attacks Threatening SME’s (and how to prevent them)May 13, 2021 - 5:14 am

    Small and medium sized enterprises (SME’s) frequently underestimate the need for cyber security protection. This miscalculation could end up being a risky strategy for those not willing to invest in the best preventative measures for their business. Just because an enterprise is small, does not mean it is not at risk from the top cyber […]

  • GDPR Cyber Security and How It Might Impact Your BusinessMarch 2, 2021 - 11:45 am

    The European Union’s General Data Protection Regulation (GDPR), came into effect back in May 2018, but what does that mean for Australian businesses and cyber security? What is GDPR? First of all, what actually is GDPR? The GDPR is short for General Data Protection Regulation. It was brought in by the European Union on 25th […]

  • How to Prepare A Cyber Defence Plan for Your EnterpriseFebruary 12, 2021 - 4:56 am

    No business, small or large is not at risk from a cyber attack. From small businesses to huge government organisations, all companies must ensure they have an excellent cyber defence plan in place. Planning what to do in a cyber attack is just as important as managing active preventative measures. Many smaller enterprises do not […]

  • Cyber Security Australia: Increasing Attacks on BusinessesFebruary 12, 2021 - 3:21 am

    Cyber security in Australia is an essential tool to protect businesses both large and small, from advancing cyber crime threats. In this current environment it is vital that no matter the size of the company, everyone is doing what they can to stay secure online. In the past, businesses only had to really worry about […]

  • Cyber Security Risk: What would it cost if your company could not work for one day?February 12, 2021 - 2:56 am

    Cyber security risk is a problem all companies face, from large corporations to small, independent businesses. But cyber security is much more than a simple IT issue, it can have a huge impact on your revenue…and reputation. Have you ever thought about what you could lose if your business were to go offline from a […]

Choose Category

  • Advanced Development Capability
  • Assessment and Insights
  • Case Studies
  • Cloud Services
  • Cube News
  • Cyber Attacks
  • Cyber Crime Australia
  • Enterprise
  • Expert Advice
  • Incident Response
  • Industry
  • Internet of Things
  • Large Corporation
  • Managed Protection
  • Operational Technology
  • Remote Working
  • SME's
  • Threat Protection
  • Vulnerability Assessments

Wondering how much our solutions cost?

GET A FREE QUOTE

Not sure yet? Get a Free Trial now.

GET A FREE TRIAL

ABOUT CUBE CYBER

About Us
Contact Us

CALL 1300 085 366

SERVICES

Cyber Risk & Technical Assurance
Segmentation and Zero Trust
Penetration Testing
Infrastructure security assessment
Secure Architecture Development

MANAGED SECURITY

Managed Security
Managed Detection & Response
Security-as-a-Service

RESOURCES

Cyber Security Blog
Case Studies
Cyber Security FAQs

ISO 27001 CERTIFIED

© CubeCyber 2023. All Right Reserved | Designed & Developed by Escope

Data Breaches and Cyber Crime in AustraliaMaze Ransomware Group Shuts Down But is the Threat Still Real?
Scroll to top

We use cookies to make your experience of our websites better. By using and further navigating this website you accept this.

Accept & Close

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Privacy Policy

You can read about our cookies and privacy settings in detail on our Privacy Policy Page.

Privacy Policy