{"id":9280,"date":"2023-08-10T11:09:15","date_gmt":"2023-08-10T09:09:15","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=9280"},"modified":"2024-05-16T13:22:29","modified_gmt":"2024-05-16T11:22:29","slug":"how-to-prevent-phishing-in-your-company","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/","title":{"rendered":"How to prevent phishing in your company"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cybercriminals do not focus on just one or a few strategies to achieve their goals, but have multiple tactics at their disposal to <strong>breach the security<\/strong> of their prey. One of them, which we will discuss today, is the method known as <a href=\"https:\/\/www.incibe.es\/aprendeciberseguridad\/phishing\">Phishing<\/a>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">At Inprosec we will tell you what it is, its different types and how to <strong>avoid get pished.<\/strong><\/span><\/p>\n\n<h2>What is Phishing?<\/h2>\n<p><span style=\"font-weight: 400;\">To cut to the chase, Phishing is a form of cyber-attack where <strong>the attacker poses as a trustworthy organisation or contact<\/strong> to deceive other users in order to obtain sensitive data such as personal information, business data or even generate opportunities to sneak in<strong> malicious software<\/strong>.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The most targeted information is usually passwords or bank details.<\/span><\/p>\n<h2><strong>What types of phishing are there?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">This is a technique that has been around for a long time, but it has not stopped being updated over the years. Cyber-attackers are always finding new ways to renew it, refining their communication and visual strategies and improvising new communication channels. With the development of the internet as one of the main means of communication, phishing has not ceased to increase in creativity and effectiveness.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some of its variants:<\/span><\/p>\n<h3><strong>Email Phishing<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\"><strong>Email phishing<\/strong>, also known as deceptive phishing, is the most common phishing practice in general. Used for decades, its landmarks include the theft of bank accounts. Its procedure consists of arriving in the inbox of those affected in the form of a corporate email, created in a way that is trustworthy and attractive to the user&#8217;s eyes by copying colours, banners and fonts of legal or famous entities.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These emails<strong> contain malicious links<\/strong> which, once clicked on, are subject to data theft or the automatic installation of all kinds of malware on their computers. They are not usually personalised, but are created to be sent to a mass audience looking for a small percentage to take the bait.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The best way to spot them is to look at the email addresses, as they often contain characters or numbers that differentiate them from trustworthy corporate or personal emails.<\/span><\/p>\n<h3><strong>Spear Phishing<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">This is a strategy that targets users working in <strong>particular businesses or very specific<\/strong> (or small) industries, with the aim of taking over the business itself. In this case, the emails are much more elaborate, using logos and signatures that mimic or copy the real thing, and the wording is more personalised and targeted to the user than in the case of traditional email phishing.\u00a0<\/span><\/p>\n<h3><strong>Whale Phishing<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Unlike Spear, <strong>Whale Phishing<\/strong> is a large-scale <strong>attack targeting the leaders<\/strong> or &#8220;bigwigs&#8221; of large organisations. Before executing this type of attack, hackers carry out an intensive search to collect data on their targets, and <strong>carefully strategise<\/strong> their mailings. They often use sensitive data to build relationships with targets, such as stolen secret reports or information that should not be known outside the organisation. In addition, their mailings are well documented to make them appear reliable and from within the targeted organisations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The idea behind these attacks is almost always financially motivated, asking for money for budgets or projects. Fortunately, very few of these emails are successful.<\/span><\/p>\n<h3><strong>Pharming<\/strong><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9283\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-pharming.jpg\" alt=\"\" width=\"799\" height=\"420\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-pharming.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-pharming-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-pharming-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising-pharming-600x315.jpg 600w\" sizes=\"(max-width: 799px) 100vw, 799px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In this type of phishing,<strong> the emails are sent from legitimate or official sources<\/strong>. Usually, urgent actions are requested, such as correcting banking information or changing the password of certain accounts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The way <strong>the fraud works is in the redirection<\/strong>, passing through a fake website where the data is stored. It can also affect the DNS cache, sending those affected to a fake website identical to the original where sensitive data is stolen.<\/span><\/p>\n<h3><strong>Smishing<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">In contrast to the above, smishing involves the fraudulent <strong>extraction of user data via SMS<\/strong> instead of email. These take the affected parties to fake pages, very similar to the original ones, where they are asked to fill in data that is stored.<\/span><\/p>\n<h3><strong>Vishing<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">This is a type of scam, in the form of a telephone call, in which an attempt is made to intimidate the recipient into giving up his or her data and information. The name comes from combining the words voice and phishing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Usually,<strong> the caller pretends to be an important and trusted entity<\/strong> and asks the user for sensitive data such as their ID number, bank account number or passwords to important services.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although attackers often change their phone number, and bypass the SPAM filters on our mobile phones, we have to be aware that no entity would ask for our most sensitive data over the phone, but only through channels confirmed as official and secure.<\/span><\/p>\n<h2>How can we avoid Phishing?<\/h2>\n<p><span style=\"font-weight: 400;\">These are the points to bear in mind when it comes to <strong>avoiding phishing<\/strong>:<\/span><\/p>\n<h3><b>Carefully <\/b>review <b>the contents of emails<\/b><\/h3>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9285\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/evitar-phising-revisando-correos.jpg\" alt=\"\" width=\"801\" height=\"421\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/evitar-phising-revisando-correos.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/evitar-phising-revisando-correos-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/evitar-phising-revisando-correos-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/evitar-phising-revisando-correos-600x315.jpg 600w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Most fraudulent emails start to deflate if you look at their content. When they try to hold on to information about the person concerned, they rarely offer all the data, but only small drops. It is important to keep this in mind, as <strong>legitimate e-mails will always use complete information<\/strong>, especially if it is sensitive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Do not overlook the issue of grammar and spelling, whether the content of the email is what you would expect from such an email, or whether you are asked for information that you would never be asked for (e.g. your passwords).<\/span><\/p>\n<h3><b>Pay attention to email addresses and links<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">As we have repeated several times throughout this article, the best way to avoid falling for this kind of scam is to <strong>look closely at the email addresses<\/strong>, as this is the most difficult element of an original email to replicate.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also advisable to pay attention to the <strong>structure of the links<\/strong> contained in the email, as despite appearing to be identical to real URLs, they will always have a different\/erroneous character or UTM that can tip us off that we are dealing with a fraudulent email. For example, a good way is to make sure that the links have HTTPS protocol instead of HTTP, as Google marks the former as secure websites.<\/span><\/p>\n<h3><b>Secure your identity<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Using a <strong>VPN<\/strong> (Virtual Private Network) allows you to interact within an encrypted tunnel that protects you while surfing the web. It makes your identity and location get masked<\/span> <span style=\"font-weight: 400;\">thanks the direct connection to private servers. Of course, this minimises the likelihood that your data can be snooped on.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Surfing with the VPN activated as a matter of course is one of the most reliable methods to avoid phishing.<\/span><\/p>\n<h3><b>Digitally signing emails<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Another increasingly reliable method is to use <strong>S\/MIME certificates<\/strong>, which allows you to strengthen the security of your corporate emails.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This consists in<strong> the requirement of a digital signature for emails<\/strong>, which, without it, will be returned to the sender without the possibility of reaching their target.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this way, S\/MIME will be able to verify the origin of emails and protect you from phishing by means of cryptographic functions. It is practically impossible to replicate the cryptographic signature of these systems, so security will be unassailable.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals do not focus on just one or a few strategies to achieve their goals, but have multiple tactics at their disposal to breach the security of their prey. One of them, which we will discuss today, is the method known as Phishing.\u00a0 At Inprosec we will tell you what it is, its different types&#8230;<\/p>\n","protected":false},"author":6,"featured_media":9278,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[54,97],"tags":[160,159],"class_list":["post-9280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-en","category-information-security","tag-phishing","tag-technical-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to prevent phishing in your company - Inprosec<\/title>\n<meta name=\"description\" content=\"Cyber criminals don&#039;t focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent phishing in your company\" \/>\n<meta property=\"og:description\" content=\"Cyber criminals don&#039;t focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-10T09:09:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T11:22:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"How to prevent phishing in your company\",\"datePublished\":\"2023-08-10T09:09:15+00:00\",\"dateModified\":\"2024-05-16T11:22:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/\"},\"wordCount\":1175,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/como-evitar-phising.jpg\",\"keywords\":[\"Phishing\",\"Technical Security\"],\"articleSection\":[\"Cybersecurity\",\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/\",\"name\":\"How to prevent phishing in your company - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/como-evitar-phising.jpg\",\"datePublished\":\"2023-08-10T09:09:15+00:00\",\"dateModified\":\"2024-05-16T11:22:29+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"Cyber criminals don't focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/como-evitar-phising.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/como-evitar-phising.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/how-to-prevent-phishing-in-your-company\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to prevent phishing in your company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to prevent phishing in your company - Inprosec","description":"Cyber criminals don't focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/","og_locale":"en_US","og_type":"article","og_title":"How to prevent phishing in your company","og_description":"Cyber criminals don't focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.","og_url":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/","og_site_name":"Inprosec","article_published_time":"2023-08-10T09:09:15+00:00","article_modified_time":"2024-05-16T11:22:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"How to prevent phishing in your company","datePublished":"2023-08-10T09:09:15+00:00","dateModified":"2024-05-16T11:22:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/"},"wordCount":1175,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg","keywords":["Phishing","Technical Security"],"articleSection":["Cybersecurity","Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/","url":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/","name":"How to prevent phishing in your company - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg","datePublished":"2023-08-10T09:09:15+00:00","dateModified":"2024-05-16T11:22:29+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"Cyber criminals don't focus solely on one or a few strategies to achieve their objectives; instead, they have multiple tactics to breach the security of their targets. One of these tactics is known as Phishing. At Inprosec, we will explain what it is, its different types, and how to avoid Phishing.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/como-evitar-phising.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/how-to-prevent-phishing-in-your-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"How to prevent phishing in your company"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=9280"}],"version-history":[{"count":3,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9280\/revisions"}],"predecessor-version":[{"id":9290,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9280\/revisions\/9290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/9278"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=9280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=9280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=9280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}