Home
Blog
How to Prevent Email Phishing Attacks

How to Prevent Email Phishing Attacks

Avatar photo
Hwei Oh
01/23/2024
4 min read
Share this article:

Phishing remains one of the most prominent attack vectors in use today. According to the Cybersecurity and Infrastructure Security Agency (CISA), over 90% of all cyber attacks begin with phishing.

Two core reasons for phishing’s prominence are:

  • It’s relatively cheap to carry out on a broad scale.
  • It exploits a usually weak link in a company—the human element.

By the end of Q4 2022, the number of phishing attacks worldwide spiked to over 1.35 million.

Phishing is often the first step in far more sophisticated attacks, such as:

  • Malware
  • Ransomware
  • Compromised accounts
  • Financial fraud
  • Business Email Compromise (BEC)
  • And others

Investing in fortifying your business against phishing attacks is one of the more significant steps you can take towards protecting your company. Here’s how to prevent phishing attacks in your business.

Spot the telltale signs of phishing

Even the most sophisticated phishing attacks typically contain one or more telltale signs. If your employees know how to spot them, you’ll dramatically reduce the risk of a successful phishing attack.

Grammatical errors

Phishing emails often contain grammatical errors either because the writer doesn’t know the language fluently or because they’re trying to get around spam filters.

Corporate emails often go through rigorous internal checks and proofreads before being approved, so it’s unlikely that a legitimate email will contain typographical or grammatical errors.

Alarming nature

Phishing emails often contain some kind of urgency to elicit a knee-jerk response, get you to click a fraudulent link in the email, and then capture your details in a phishing website. They may pretend to be a CEO asking to send out a payment, or it might be an impersonated retailer confirming a large purchase amount.

Rule of thumb: Companies rarely send alarming emails or emails that directly ask for account details. Employees should always verify and/or reach out to IT if something looks fishy.

Sending domain

Although it’s possible to “spoof” a sender’s name and domain, it’s becoming more challenging as email servers crack down on reducing fraudulent emails.

As a first step, look at the sender’s domain. Phishing emails often use similar-looking domain names to evade unsuspecting victims. For example, PayPal phishing emails may use false domains such as:

  • paypall.com
  • Yourpaypal.com
  • Payypal.com
  • Ppaypal.com

…and so on.

Coupled with an urgent-sounding message and a sender name like “PayPal Customer Service,” it can be easy to miss a small detail and believe the phishing email.

Subdomains

Another common tactic is to use subdomains. Criminals can create a subdomain on their own fraudulent domain to improve their impersonation tactics. For example, a criminal can buy the domain customerservice123.com, allowing them to send an email from someone@paypal.customerservice123.com.

While this may seem like an easy giveaway, someone who isn’t as vigilant may see the paypal name and believe it’s a legitimate email.

Always inspect the sending domain carefully.

Spot a spoofed email address

Industry standards such as SPF (Sender Policy Framework) and DKIM (DomainKeys Identified Mail) have greatly reduced the ability of fraudsters to forge sending addresses. Large corporations and financial institutions will typically configure SPF and DKIM capabilities for their emails, lowering the chances that fraudsters can spoof addresses from these institutions.

You can also perform manual checks to look for anomalies in a sender’s address. Tools like Google’s MessageHeader Analyzer make it easier. Just paste the “email headers” for your particular email client into the analyzer and then look at the result for anomalies such as:

  • Multiple ‘from’ fields
  • Inconsistent return-path values
  • Inconsistent domain names

Tools to prevent emails from reaching employees

The most secure approach against phishing emails is to use a combination of automated tools and thorough employee training to protect your company against phishing.

Automated filters

You can use filters that detect phishing emails based on the sending IP address, suspicious domains, known malicious senders, or sender reputation. These can handle most mass-phishing emails.

SPF/DKIM checks

Most modern email clients perform SPF and DKIM checks on received emails, ensuring that the sending address hasn’t been forged. Your team should ensure that all employee email clients are up to date, and configure policies for what happens with emails that fail such checks.

AI natural language processing

Natural language processing (NLP) tools can analyze an email’s text and give it a score that will flag suspicious or illegitimate emails. You can set what happens to these emails — whether they’re blocked, or the recipient is given a warning.

Blocklists/allow-lists

For high-risk departments or addresses, such as the accounting department, you may want to adopt a stricter approach such as implementing blacklists/graylists/whitelists of domains and IP addresses. The downside with this option is that it does result in more false positives which is why it’s not ideal for the entire organization.

Stop successful phishing attacks with a managed security partner

It’s impossible to guarantee 100% phishing prevention, so partnering with a managed security provider that understands email security and your specific business needs, goes a long way to securing your email channels and preventing successful attacks from damaging your organization too much.

Partnering with a managed security program provider can help with:

  • Detection and response: catches infiltration before damage is done.
  • Ransomware detection and readiness: prevents phishing emails from dropping ransomware on a device or your network.
  • MFA (multi-factor authentication) and account security: prevent account takeover even if an employee clicks a link in a phishing email.

Phishing opens the door to more severe threats, such as ransomware and account compromise. A managed security program reduces the potential that your organization is susceptible to these severe threats.

SolCyber offers a foundational security package that covers the email and other security needs of most organizations. Reach out to us if you’d like to learn more about it.

Avatar photo
Hwei Oh
01/23/2024
Share this article:

Table of contents:

The world doesn’t need another traditional MSSP 
or MDR or XDR.

What it requires is practicality and reason.

Related articles

Businesses don’t need more security tools; they need transparent, human-managed cybersecurity and a trusted partner who ensures nothing is hidden.

It’s time to move beyond the inadequacies of current managed services and experience true security management.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more dealing with poor automated services.
No more services that only detect but don’t respond.
No more breaches caused by all of the above.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

CONTACT
©
2024
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

6392