1 min read

91% of cyber attacks start with an email

Featured Image

Email is the most common type of threat vector, and 23% of people click on malicious emails. It only takes one click for your whole network to be compromised. 

As a business it is important to be aware of the different types of phishing emails cyber criminals use to target organisations. This infographic highlights the most commonly used and how you can protect your business. 

 

Bleam ~ 5 Types of Phishing Attacks and how to avoid them-01 

1. Bulk Phishing 

This is when cyber criminals send out a large number of untargeted phishing emails. 

2. Spear Phishing 

Spear phishing involves targeting a specific individual or business with malicious emails. 

3. Whaling 

Similar to spear phishing this is when cyber criminals will target a company's executives. 

4. Vishing 

This is when phishing attacks are performed over the phone or VOIP. 

5. Smishing

These are attacks that use text messages to mislead or deceive a victim. 

Advanced email phishing attacks remain the most problematic cyber security issue that organisations face today. 

Whilst Secure Email Gateways remain a critical security layer, Bleam’s MDR for Email service complements existing software, providing another layer of endpoint protection that operates from inside the mailbox itself. 

If you would like to know more about phishing attacks and what you can be doing to keep your company safe, why not join us at our next event. 

 

 

5 benefits of outsourcing your cyber security

Maintaining a strong security posture is a significant challenge for most businesses. With complex cyber-attacks becoming more common, all businesses...

Read More

The 6 worst cyberattacks of 2021

2021 was a year of digital transformation for all businesses. The widespread adoption of remote and hybrid work has resulted in employees being more...

Read More

91% of cyber attacks start with an email

Email is the most common type of threat vector, and 23% of people click on malicious emails. It only takes one click for your whole network to be...

Read More