Cybersecurity

How do I protect my business from phishing attacks?

How modern phishing works, why traditional defenses aren't enough, and the layered approach that actually protects your business.

centrexIT Team 8 min read

Key Takeaways

  • Phishing is the #1 attack vector - 82% of campaigns now use AI to craft convincing messages
  • Modern phishing goes beyond email: watch for smishing (SMS), vishing (voice), and quishing (QR codes)
  • Security awareness training reduces phishing susceptibility by up to 86% within a year
  • Layer your defenses: email filtering, DMARC/DKIM/SPF, MFA, and regular phishing simulations
  • One click is all it takes - even tech-savvy employees fall for well-crafted phishing

Here’s a stat that should keep every business owner up at night: 91% of all cyberattacks begin with a phishing email. Not a sophisticated hack. Not a zero-day exploit. An email.

And it’s getting worse. Phishing attacks have evolved far beyond the poorly spelled Nigerian prince scams of the past. Today’s phishing is polished, personalized, and increasingly powered by AI. Let’s talk about how it works, why your current defenses probably aren’t enough, and what actually protects your business.

What Is Phishing, Really?

Phishing is social engineering through digital communication. An attacker pretends to be someone you trust - your bank, your boss, Microsoft, a vendor - and tricks you into doing something dangerous:

  • Clicking a malicious link
  • Opening an infected attachment
  • Entering your credentials on a fake login page
  • Wiring money to a fraudulent account
  • Sharing sensitive information

The goal is almost always one of three things: steal credentials, install malware, or trick you into sending money.

Why it works

Phishing exploits human psychology, not technology. It leverages:

  • Urgency - “Your account will be suspended in 24 hours”
  • Authority - “The CEO needs this wire transfer done immediately”
  • Fear - “Unusual login detected on your account”
  • Curiosity - “You have a package delivery waiting”
  • Trust - “Here’s the invoice you requested” (from a known vendor’s spoofed email)

No firewall can block human nature. That’s why phishing remains the number-one attack vector year after year.

How Modern Phishing Has Evolved

If you think you can spot phishing because of typos and weird formatting, think again. The game has changed dramatically.

AI-Powered Phishing

82% of phishing campaigns now use AI tools to generate messages. This means:

  • Perfect grammar and spelling - No more obvious red flags
  • Personalized content - AI scrapes LinkedIn, company websites, and social media to craft targeted messages
  • Contextually relevant - References to real projects, real colleagues, real events
  • Scalable - Attackers can generate thousands of unique, convincing messages in minutes

A 2024 study found that AI-generated phishing emails had a 60% higher click rate than traditionally crafted ones.

Beyond Email: The New Phishing Channels

Email is still the primary vector, but attackers have expanded to channels where people let their guard down.

Attack TypeChannelExample
PhishingEmailFake Microsoft 365 login page
SmishingSMS/Text”Your package couldn’t be delivered” with a malicious link
VishingVoice/PhoneCaller impersonating IT support asking for your password
QuishingQR CodesFake QR code on a parking meter or printed flyer that leads to a credential-harvesting site
Spear phishingEmailHighly targeted attack researched specifically for one person
Business Email Compromise (BEC)EmailCompromised or spoofed executive email requesting a wire transfer

Business Email Compromise (BEC)

BEC deserves special attention because it’s the most financially devastating form of phishing. The FBI’s Internet Crime Complaint Center reported BEC losses of $2.9 billion in 2023 - more than any other cybercrime category.

How BEC works

  1. Attacker compromises or spoofs an executive’s email account
  2. Sends a request to someone in finance or HR
  3. The request looks legitimate - it’s coming from (or appears to come from) the CEO
  4. Employee wires money, sends W-2s, or shares sensitive data
  5. By the time anyone notices, the money is gone

Real example

A San Diego law firm received an email from what appeared to be a partner’s email account requesting a $187,000 wire transfer to close a real estate deal. The email referenced a real transaction. The bookkeeper processed it. The money went to an account in Eastern Europe. The partner’s email had been compromised for three weeks before the attack.

Why Your Current Defenses Aren’t Enough

Most businesses rely on their email provider’s built-in spam filtering. Microsoft 365 and Google Workspace include decent basic filtering, but they miss a significant percentage of sophisticated attacks.

What basic email filtering catches

  • Known spam senders
  • Emails with known malicious attachments
  • Obvious spoofing attempts
  • Messages from blacklisted domains

What basic filtering misses

  • New, never-before-seen phishing URLs (zero-hour attacks)
  • Compromised legitimate email accounts sending phishing
  • Sophisticated spoofing that passes basic checks
  • Attachments with delayed payloads (clean when scanned, malicious when opened later)
  • QR codes embedded in images or PDFs

Studies show that basic email filtering misses approximately 25-30% of phishing emails. That means one in four malicious emails reaches your employees’ inboxes.

The Layered Defense Approach

Effective phishing protection requires multiple layers. No single solution stops everything, but together, they create a defense that’s very difficult to penetrate.

Layer 1: Advanced Email Security

Go beyond your email provider’s built-in filtering with a dedicated email security solution.

What to look for

  • AI-powered detection - Analyzes email behavior patterns, not just content
  • URL rewriting and time-of-click analysis - Checks links when the user clicks, not just when the email arrives
  • Attachment sandboxing - Opens attachments in a safe environment before delivery
  • Impersonation protection - Detects when someone is spoofing your executives or vendors
  • QR code scanning - Extracts and analyzes URLs hidden in QR codes

Solutions in this space

Proofpoint, Mimecast, Abnormal Security, Microsoft Defender for Office 365 (Plan 2), and Avanan are all solid options. Your IT provider should recommend one appropriate for your size and budget.

Layer 2: Email Authentication (DMARC, DKIM, SPF)

These three protocols work together to prevent attackers from spoofing your domain - sending emails that appear to come from your company.

SPF (Sender Policy Framework)

Defines which mail servers are authorized to send email on behalf of your domain. If someone sends email pretending to be you from an unauthorized server, receiving mail systems can flag or reject it.

DKIM (DomainKeys Identified Mail)

Adds a digital signature to your outgoing emails. Receiving servers can verify that the email hasn’t been tampered with in transit.

DMARC (Domain-based Message Authentication, Reporting and Conformance)

Ties SPF and DKIM together and tells receiving servers what to do when authentication fails:

  • None - Monitor only (no action)
  • Quarantine - Send suspicious messages to spam
  • Reject - Block unauthenticated messages entirely

Why this matters

Without DMARC, anyone can send emails that appear to come from your domain. Your employees, your customers, and your vendors could all receive phishing emails that look like they’re from you.

Setting up SPF, DKIM, and DMARC is free - it just requires DNS configuration. Yet over 70% of small businesses haven’t implemented DMARC.

Layer 3: Multi-Factor Authentication (MFA)

Even if phishing successfully steals a password, MFA prevents the attacker from using it. This is your safety net.

  • Email accounts - The most critical place for MFA
  • Cloud applications - Any SaaS tool with company data
  • VPN and remote access - Block unauthorized remote connections
  • Financial systems - Banking, accounting software

MFA doesn’t prevent phishing from happening, but it dramatically limits the damage. Microsoft reports that MFA blocks 99.9% of account compromise attacks.

Layer 4: Security Awareness Training

Technology catches most phishing. Training catches the rest.

What effective training looks like

  • Regular cadence - Monthly or quarterly, not annual
  • Short and engaging - 5-10 minute modules, not hour-long lectures
  • Real examples - Show actual phishing emails (sanitized) that targeted businesses like yours
  • Phishing simulations - Send fake phishing emails to test employees, then train those who click
  • Positive reinforcement - Reward employees for reporting suspicious emails, don’t punish them for falling for simulations

The data on training effectiveness

Time in ProgramAverage Click Rate on Simulations
Before training32%
After 3 months17%
After 6 months9%
After 12 months4.5%

That’s an 86% reduction in susceptibility within a year. No technology investment delivers that kind of improvement alone.

What to train employees on

  • Verify the sender - Check the actual email address, not just the display name
  • Hover before clicking - Preview URLs before clicking them
  • Watch for urgency and pressure - Legitimate requests rarely demand immediate action
  • When in doubt, verify out-of-band - Call the sender using a known number (not the one in the email) to confirm the request
  • Report, don’t delete - Reporting helps your IT team identify and block campaigns

Layer 5: Incident Response Procedures

When someone does click a phishing link (and eventually someone will), speed matters.

Immediate response steps

  1. Employee reports the incident - Make this easy. A one-click “Report Phishing” button in their email client
  2. IT investigates - Was the link clicked? Were credentials entered? Was malware downloaded?
  3. Contain the threat - Reset the compromised password, revoke active sessions, isolate the device if malware is suspected
  4. Assess the blast radius - Did the attacker access any data? Send any emails from the compromised account? Create any forwarding rules?
  5. Remediate - Remove malicious emails from other inboxes, block the sending domain, update filtering rules

The critical window

The average time between a credential being phished and an attacker using it is under one hour. For BEC attacks, fraudulent wire transfers are often initiated within minutes of account compromise. Speed of response directly determines the severity of the outcome.

Building Your Phishing Defense Plan

Here’s a practical checklist for building a layered phishing defense, ordered by impact and ease of implementation.

Do These Now (Week 1)

  • Enable MFA on all email accounts and cloud applications
  • Set up SPF, DKIM, and DMARC on your email domain
  • Deploy a “Report Phishing” button in your email client
  • Brief your team on the current phishing landscape

Do These Soon (Month 1)

  • Deploy advanced email security (beyond built-in filtering)
  • Start a security awareness training program with monthly modules
  • Conduct your first phishing simulation to establish a baseline click rate
  • Create a simple incident response procedure for reported phishing

Do These Next (Quarter 1)

  • Review and tighten DMARC policy (move to quarantine or reject)
  • Run quarterly phishing simulations with increasing sophistication
  • Implement conditional access policies (block logins from suspicious locations)
  • Audit email forwarding rules across all accounts (attackers love to set up hidden forwarding)

Do These Ongoing

  • Monthly training content refreshes
  • Regular phishing simulations (at least quarterly)
  • Review email security reports for trends
  • Update training based on new attack techniques
  • Annual review of all email security configurations

What to Do When Someone Falls for Phishing

It’s going to happen. Even with perfect training and technology, someone will eventually click a link or enter credentials on a fake page. How you respond determines whether it’s a minor incident or a major breach.

Step 1: Don’t panic, don’t blame

If employees fear punishment, they won’t report incidents. You need them to report immediately, not hide what happened.

Step 2: Reset credentials immediately

Change the compromised password and revoke all active sessions. Do this within minutes, not hours.

Step 3: Check for unauthorized access

  • Review login history for the compromised account
  • Check for new email forwarding rules or inbox rules
  • Look for emails sent from the account after compromise
  • Verify no new MFA methods were registered by the attacker

Step 4: Scan the device

If the user clicked a link that may have downloaded malware, isolate and scan the device with EDR tools.

Step 5: Notify affected parties

If the attacker accessed sensitive data or sent emails from the compromised account, notify anyone who may have been impacted.

Step 6: Learn and improve

What type of phishing was it? Why did it get through? How can you adjust training and technology to catch similar attacks in the future?

The Bottom Line

Phishing is the most common, most effective, and most dangerous cyber threat facing businesses today. It’s not going away - it’s getting more sophisticated by the month.

But it’s also highly defendable. Businesses that combine:

  • Advanced email security to catch most phishing before it reaches inboxes
  • Email authentication (DMARC/DKIM/SPF) to prevent domain spoofing
  • MFA on all accounts to limit the damage when credentials are stolen
  • Regular security awareness training to build human resilience
  • Clear incident response procedures to react quickly when phishing succeeds

…reduce their phishing risk by over 95%. That’s not a guarantee - nothing is in security - but it makes you a dramatically harder target.

The one thing you can’t afford to do is rely on your employees to “just be careful.” Phishing is designed to trick careful people. Layer your defenses, train your team, and assume that one day someone will click. Be ready for it.


Want to test your team’s phishing readiness? Contact us for a phishing simulation and security awareness assessment.

Have More Questions?

Our team is here to help. Whether you're evaluating IT services or have a specific question about your technology, we're happy to have a conversation.