Talk to a local business expert
Request a callback from your local Telstra Business Technology Centre and we'll be in touch to discuss your needs.
To help protect your business against potential data breaches, it pays to stay informed. Here, we show you how scammers use phishing to target businesses and share advice on how you can boost your cyber security defences.
If you’ve searched ‘phishing meaning’ online recently, you’re not alone. There’s been a big rise in phishing attacks lately, leading many business owners on a quest to learn more about phishing and to consider the potential impact of cyber security breaches.
Basically, phishing is the name given to scam emails, calls, or messages that attempt to persuade you to provide personal or sensitive information, such as passwords, addresses, or financial information, or to run attachments containing malware like viruses. The content of those calls and messages is sometimes referred to as ‘lures’ or ‘pretext’.
A phishing attack is when a cybercriminal sends a deceptive message pretending to be someone else you trust, such as a large organisation or individual. These deceptive messages can be sent via email or SMS and even on social media platforms. Often, a phishing message links to a fake website that asks you to enter confidential information.
Cybercriminals often cast a wide net, aiming to exploit any opportunity to access sensitive information. This means phishing scams have the potential to impact everyone, from individuals using personal mobiles to businesses of all sizes and industries.
This emphasizes the importance of educating yourself and your staff to identify and respond appropriately to phishing attempts. By investing in training to develop a cybersecure mindset, you can help reduce your vulnerability.
To help minimise the risk of hackers defrauding your business, it’s worth considering how to defend yourself against phishing attacks.
Cybercriminals use different types of phishing methods when targeting individuals and businesses.
These methods change over time with new labels continually introduced, so to avoid confusion keep in mind that all forms of phishing fundamentally work the same; all phishing is designed to trick someone into giving up something of value.
The means in which the messages are delivered, such as an app or phone call, and the contents of the messages vary over time.
The value of the information or access criminals seek also varies such that something that seems of little value to you today may be valuable to criminals tomorrow.
Some of the specific phishing variations you may see discussed today include:
Just like phishing can take many forms that all share fundamental characteristics, so too does effective defence.
You can look out for classic hallmarks of phishing, like typos and dodgy links, which vary between given phishing messages. Some have typos, others not. Some have suspicious links, others appear ordinary. Legitimate emails often have links that point to different domains for the purposes of tracking click rates. Some of these emails have typos.
Your best bet therefore is to be weary of any unexpected communication regardless of how it arrives or who claims to be behind it.
If you did not expect the call or request, allow yourself to be suspicious. Report or delete it, or if you are curious call or email the would-be sender on a known, trusted, official contact and not those contained in the suspicious message.
Still, traditional red flags can be useful as many phishing messages do indeed have typos and other errors.
Watch out for grammatical errors, misspelt names, pressure to act soon, and incorrect facts. Here are some other tips to help you stay vigilant:
Trusted organisations don’t usually ask customers to share sensitive information via unsolicited correspondence. They should never ask for your multifactor authentication code, often a series of numbers sent over text that you use to log into your account after entering your password. So, never share personal details unless you’re sure you know who you’re talking to. Likewise, be wary of clicking on links within, or downloading attachments from, messages that seem suspicious.
Phishing scams can use a range of scenarios to try to trick recipients into revealing sensitive information. Some common scenarios include:
The message claims that your account has been compromised or unusual activity has been detected, urging you to click a link to secure your account.
Scammers will impersonate a coworker, asking for sensitive information or payment transfers, often framing it as urgent.
The message notifies you of a package delivery issue and asks you to click a link or provide details to resolve the problem.
Cybercriminals will send a fraudulent invoice or payment request, often impersonating a legitimate service, prompting you to provide payment details.
It’s important to remember that this list is not exhaustive. Phishing scams can come in many forms, so staying diligent is your best defence against these types of cyber attacks.
When it comes to the question of how to avoid phishing, there are steps you can take today to help protect your business tomorrow.
To help prevent phishing scams impacting your business, it’s important to educate yourself and any employees such that they:
According to ACSC, the best ways to help protect your business from phishing attempts are to keep across current threats, be cautious online, and take steps to block malicious or unwanted messages from reaching you in the first place. There are multiple ways to help stop security breaches, including investing in mobile device email and application security solutions.
Business email compromise is a type of phishing attack that’s specifically targeted at businesses. It can take various forms and target anyone in an organisation that could give scammers a way in.
Spend some time to understand how criminals might target your business in this way and how to help prevent business email compromise in your business operations.
If you think your business has been targeted by a phishing attack, it’s important to act fast. Firstly, understand the compromised message and what information or access was handed over. This dictates your next steps,
Steps to consider:
You may also choose to lodge a formal report with the Australian Cyber Security Centre's ReportCyber page. There, you can report a cybercrime, incident or vulnerability and check the status of an existing cybercrime report.
Every business is different and not all security technologies are a universal fit.
But there are some critical things that every business should implement.
Top tips from ACSC on how to help protect yourself from phishing attempts include using spam filters and conducting yourself securely online.
As an extra precaution, you may also choose to invest in cyber security software designed to help block cybercriminals from causing your business financial harm.
No matter what your current risk management strategy, it pays to stay informed on the latest threats. To do so, you can find information on the latest scams impacting individuals and businesses on the Australian Government’s Scamwatch website.
Last published May 2023, updated October 2024.
Request a callback from your local Telstra Business Technology Centre and we'll be in touch to discuss your needs.
Enhance your digital security on up to 15 devices and help make doing business online safer.