Email Phishing: Keeping Your Business Safe
Phishing emails account for the majority of successful cyberattacks on UK businesses. Combining technical controls — email authentication, filtering, and secure gateways — with regular staff training significantly reduces the risk of a costly breach.
Sophie Moore
Operations Manager
What is phishing and why is it so effective?
Phishing is the practice of sending fraudulent emails designed to trick recipients into revealing credentials, transferring money, or installing malware. The term covers a broad range of tactics — from mass-sent impersonations of HMRC or parcel delivery companies, to highly targeted attacks on specific individuals using personal and professional context gathered from social media and public records.
Its effectiveness lies in exploiting human behaviour rather than technical vulnerabilities. Even technically literate employees are susceptible to a well-crafted phishing email that arrives at the right moment — when they are busy, distracted, or genuinely expecting a communication from the impersonated organisation. The National Cyber Security Centre (NCSC) identifies phishing as the most common cause of significant cyber incidents affecting UK organisations.
Recognising phishing emails
Training staff to recognise phishing is a foundational element of any security awareness programme. Key indicators include:
- Urgent or threatening language: "Your account will be suspended", "Immediate action required", "You have been selected for a HMRC rebate" — urgency is designed to override careful judgement
- Mismatched sender addresses: The display name may read "HSBC Security" but the actual sending address is a random domain with no connection to HSBC
- Suspicious links: Hovering over a link (without clicking) reveals the actual destination URL, which often differs from the displayed text or includes slight misspellings of legitimate domains
- Unexpected attachments: Macro-enabled Word documents, compressed archive files and PDF documents with embedded links are common phishing vehicles
- Requests that bypass normal processes: Any email asking for credentials, payment authority or sensitive data outside of normal channels deserves verification
Types of phishing attacks
Standard phishing
Bulk phishing campaigns impersonating well-known brands — Microsoft, Amazon, banks, HMRC — and targeting many recipients simultaneously. Less sophisticated but still effective, particularly against users without security awareness training.
Spear phishing
Targeted attacks using specific information about the recipient, their role, colleagues and current business activities. A spear phishing email might reference an ongoing project, name a real colleague, or appear to come from a known supplier. These require more effort from the attacker but achieve significantly higher success rates.
Whaling
Phishing attacks specifically targeting senior executives. The goal is typically to compromise a high-value email account, intercept communications, or authorise fraudulent payments. Whaling attacks are often combined with business email compromise tactics.
Smishing and vishing
SMS phishing (smishing) and voice phishing (vishing) are increasingly used alongside email, particularly to deliver verification codes to complete account takeovers. Staff should be aware that attackers may follow a phishing email with a follow-up SMS or phone call to reinforce the deception.
Technical controls that reduce phishing risk
No technical control eliminates phishing entirely, but a layered defence significantly reduces the probability and impact:
- Email authentication (SPF, DKIM, DMARC): Prevents criminals from spoofing your domain to send phishing emails that appear to come from your organisation, and improves detection of spoofed emails arriving at your staff
- Email security gateway: Scans inbound email for known malicious URLs, suspicious attachments and phishing indicators before delivery to the inbox
- Safe links and safe attachments: Available in Microsoft Defender for Office 365, these rewrite URLs and detonate attachments in a sandboxed environment before allowing access
- Multi-factor authentication: If credentials are stolen through phishing, MFA prevents the attacker from using them to access accounts without also compromising the second factor
Building a phishing-aware culture
Technology controls are necessary but not sufficient. Staff awareness training — conducted regularly, not as a one-off annual presentation — is what builds the habitual scepticism needed to catch attacks that get through technical filters.
Simulated phishing exercises, where controlled phishing emails are sent to staff to test their response, are the most effective training mechanism. Staff who click on a simulated phishing link should receive immediate, contextual education rather than punitive consequences. The goal is learning, not blame allocation.
An organisation where staff feel comfortable reporting suspicious emails — without fear of embarrassment — will catch real phishing attempts far earlier than one where employees quietly delete suspicious messages without telling anyone.
What to do if you receive a phishing email
If a suspicious email arrives: do not click any links or open attachments, do not reply, do not forward it to colleagues. Report it using your organisation's designated reporting process — in Microsoft 365 this can be done directly from Outlook using the Phish Alert button. If you believe you have already clicked a link or entered credentials, report it to your IT team immediately so that credentials can be changed and any access logs reviewed.
AMVIA helps UK businesses implement email security controls and delivers security awareness training programmes that measurably improve staff response to phishing attempts.
Test Your Team Against Real Phishing Attacks
AMVIA's simulated phishing exercises reveal exactly how your staff respond to phishing attempts — and deliver immediate, effective training to those who need it.
Frequently Asked Questions
Check the sender's actual email address (not just the display name), hover over any links to see the real destination URL, and be sceptical of urgent requests for credentials, payment or personal information. Legitimate organisations will not ask for your password by email. When in doubt, contact the purported sender through a known, trusted channel. <strong>Cybercrime cost (non-phishing):</strong> Average £990 per victim business (£1,970 excluding £0 responses). <em>(UK Government)</em>
Act quickly: change the employee's account password immediately, revoke any active sessions, check email forwarding rules and application permissions for signs of compromise, and review access logs for suspicious activity. If sensitive data or payment credentials may have been exposed, follow your incident response plan and consider whether a UK GDPR data breach report to the ICO is required. <strong>Phishing is the #1 attack type:</strong> 85% of businesses and 86% of charities that experienced a breach identified phishing as the cause (2025 survey). <em>(UK Government)</em>
No. While email security gateways catch a high proportion of known phishing, sophisticated targeted attacks — particularly those using new or clean infrastructure — will bypass filters. This is why staff training and multi-factor authentication are essential alongside technical controls, not alternatives to them. <strong>Phishing was the most disruptive breach</strong> for 65% of businesses and 63% of charities. <em>(UK Government)</em>
BEC is a form of phishing where criminals impersonate executives, suppliers or colleagues to deceive employees into transferring money or sharing sensitive information. Unlike malware-based phishing, BEC attacks often involve no malicious links or attachments — they succeed through social engineering alone, making them particularly hard to filter automatically. <strong>84% of SMBs</strong> that reported breaches faced phishing attacks. <em>(UK Government)</em>
Annual training is a starting point but is insufficient on its own. Regular simulated phishing exercises — quarterly at minimum — combined with timely education at the point of failure, are significantly more effective. The threat landscape changes continuously, and training should reflect current tactics including SMS phishing and voice phishing. <strong>93% of cyber crimes against businesses</strong> and 95% against charities were phishing-based. <em>(UK Government)</em>
No technical or training programme eliminates phishing risk entirely. The realistic goal is to reduce the probability of a successful attack to a level where it is no longer likely to cause significant harm, and to ensure that controls like MFA limit the impact if credentials are stolen. A layered defence is always more effective than any single control. <strong>Stolen or compromised credentials were the initial attack vector in 22% of data breaches in 2024</strong> — the single largest cause of breaches, surpassing phishing (16%) and software vulnerabilities (Verizon DBIR 2025). <em>(ITPro)</em>
Related Reading
Business Email Security
A comprehensive guide to protecting your business email from phishing, spoofing and malware.
Phishing Recognition & Response
How to train employees to recognise phishing attempts and respond effectively when targeted.
What Is DMARC?
DMARC prevents criminals from spoofing your domain in phishing emails — find out how to implement it.