What is Phishing?
Phishing is a social engineering attack that uses fraudulent messages — usually email, sometimes text or voice — to trick users into revealing credentials, clicking malicious links, or installing malware. It remains the most common entry point for business breaches.
How Phishing works
Three-step view of how it operates in practice.
Target
Attackers identify a victim and research context — recent vendor payments, common travel, org chart. Personalization dramatically increases success.
Deliver
A crafted message lands in the inbox, mimicking a trusted brand, executive, or vendor. Links and attachments are the payload carriers.
Exploit
The victim clicks, enters credentials on a fake site, or runs the attachment. The attacker uses stolen credentials or installed malware to pivot.
Common phishing variants
A clear breakdown of the common variants.
Generic phishing
Mass-sent, impersonating well-known brands. Lowest effort, still works at scale.
Spear phishing
Time-based one-time codes from an app like Microsoft Authenticator or Google Authenticator. Offline-capable and phishing-resistant against many attacks.
Whaling
The user approves a sign-in with a tap on their phone. Easy to use but vulnerable to MFA fatigue attacks — always pair with number matching.
Smishing & vishing
FIDO2 keys like YubiKey, or device-bound passkeys. Phishing-resistant by design — the key will not authenticate against a fake domain.
Why Phishing matters for SMBs
Phishing is a social engineering attack that uses fraudulent messages — usually email, sometimes text or voice — to trick users into revealing credentials,…
Common Phishing mistakes
- Relying only on trainingTraining helps but won’t catch every user every time. Technical controls (MFA, conditional access, attachment sandboxing) matter more.
- No phishing report buttonAdmins, finance, and anyone with access to money or sensitive data should use an app or hardware key — never SMS alone.
- Punitive culture around clicksShaming users for clicking reduces reporting and drives attacks underground. Non-punitive feedback increases reporting rates.
- Skipping outbound checksDMARC, DKIM, and SPF configured correctly prevent attackers from spoofing your domain to customers.
Phishing frequently asked questions
LogicalNet services related to MFA
Related glossary terms
Want to cut phishing risk without boring your team to death?
Talk to a LogicalNet identity expert. We will review your current environment, recommend the right MFA methods for each group of users, and help you deploy without disrupting the business.