Hook, Line, and Sinker


Data Theft Happens Every Day

In 2018, a phishing attack targeted a large US city government in Atlanta.  The attackers sent an email to city employees that appeared to be from a trusted software vendor, stating that there was an urgent software update that needed to be installed.  The email contained a link to a fake login page that looked similar to the legitimate vendor’s login page.


Several employees fell for the scam and entered their login credentials on the fake page.  The attackers were then able to collect the login information and gain access to the city’s computer network.


Once inside the network, the attackers were able to deploy ransomware, which encrypted the city’s files and demanded a ransom payment in exchange for the decryption key.  The city refused to pay the ransom, and as a result, many of its systems and services were disrupted for weeks, including its court system, police department, and water services.


This incident demonstrates how phishing attacks can be used to gain access to a network and carry out more sophisticated attacks, such as ransomware.  It also highlights the importance of implementing strong security controls, such as two-factor authentication and regular security training, to help prevent and detect phishing attempts.


Think Twice Before Clicking


Phishing emails are unfortunately quite common and are one of the most prevalent types of cyber-attacks.  According to the 2021 Verizon Data Breach Investigations Report, phishing was involved in 36% of data breaches, making it the most common type of social engineering attack.


The Anti-Phishing Working Group (APWG) also reported In the third quarter of 2022, APWG observed 1,270,883 total phishing attacks, a new record and the worst quarter for phishing that APWG has ever observed.  In addition, a study by the cybersecurity company Mimecast found that 60% of organizations experienced an increase in phishing attacks in 2020, likely due to the COVID-19 pandemic and the shift to remote work.


If You Suspect Deceit, Hit Delete


Phishing attacks can be particularly effective because they rely on social engineering techniques to trick individuals into providing sensitive information or clicking on malicious links.  Phishing emails may appear to be from a legitimate source, such as a bank or a trusted company, and may use urgent or threatening language to encourage the recipient to act quickly.  It’s important to be vigilant and take steps to protect yourself from phishing attacks, such as being cautious of emails from unknown senders, verifying the authenticity of emails and links before clicking on them and regularly updating your security software.


The Best Defense is a Strong Offense


Phishing emails continue to be a major security threat, with cybercriminals using them to trick individuals and organizations into providing sensitive information or downloading malware.  Phishing emails are becoming more sophisticated.  Cybercriminals are using more complex techniques to make their phishing emails appear more legitimate.  This includes using well-crafted email content, logos, and sender names.  BEC attacks, a type of phishing attack that targets businesses, continue to increase.  According to the 2021 FBI Internet Crime Report, BEC attacks resulted in losses of $1.8 billion in 2020.  Phishing attacks are not limited to a specific region or country.


According to a report by Proofpoint, the top five countries targeted by phishing attacks in 2020 were the United States, United Kingdom, Canada, Australia, and the Netherlands.  Employees are often the target of phishing attacks, with cybercriminals using social engineering tactics to trick them into divulging sensitive information or clicking on malicious links.


Email security measures can help protect against a wide range of threats to email communications including phishing attacks, malware, spam, spoofing, email interception, data loss, viruses, and ransomware.


Protecting Your Privacy is Our Priority


Our team works with companies like yours to deliver advanced email security that uses AI and Machine Learning technology to filter your business email and help keep dangerous emails out of your inbox.  This technology uses the collective security intelligence gathered from millions of inboxes in real time to discover and contain zero-day threats.


The Strategy We Employ to Help Keep Your Email and Productivity Protected


  • Granular Control
  • Email Continuity
  • Email Compliance
  • Email Archiving
  • Mobile Device Compatibility
  • Abuse Management
  • Filtering Rules Customization
  • Attachment and Malware Blocking


Secure Your Network, Secure Your System


Want to Learn More?

Contact us today or visit our website

Subscribe to our blog

Connect with us on social media!

About C & W

We help businesses and individuals become more Secure, Effective, Productive, and Profitable by delivering SMART Technology and advice.

Recent Posts

Watch Out!

Subscribe To our Blog

Subscription Form

Sign up to receive updates about our latest blog posts