• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Sales: 02380 070101 Support: 02381 800671 sales@century-it.co.uk Book a TechieRemote SupportLog a Ticket

Century IT Services Century IT Services - Southampton - Hampshire - Logo

IT Services in Southampton, Hampshire

  • Home
  • Services
    • Microsoft 365 Cloud Services
    • IT Installation Services
    • Proactive IT Monitoring
    • Office VoIP Phone Systems Installation
    • IT Asset Management
    • G.D.P.R Advice
    • IT Projects Finance Options
    • Cyber Essentials Accreditation
  • Support Options
  • Fully Managed IT
  • About
    • Our Journey
    • Our Team
    • Join our team
    • Customer Testimonials
  • News
  • Contact

Spear-Phising

Types of Phishing Attacks

1st May 2024 By Paul Marsh

There are four main types of phishing attacks, Spear Phishing, Whaling, Smishing and Vishing as explained later in this article.

"Phishing" is a term used to describe the act of stealing or gaining access to sensitive information by luring in and tricking victims. Most common forms of phishing occur via email although this isn't always the case as attackers can use text messages as well as other messaging mediums.

Attackers usually disguise themselves as a trustworthy and reputable source often using language that gives a sense of urgency, This tied with the attackers disguise is the reason phishing is so effective.

Spear Phishing

Spear phishing is a type of phishing attack that specifically targets one or a group of users, The attackers then push the user to urgently take action. Phishing emails/messages can contain malware disguised as attachments or links to false webpages designed to look exactly like legitimate sites.

Commonly phishing attacks will contain something for the user to click on and interact with. It can be something as simple as getting the user to open a file, click on a link or divulge sensitive information.

Whaling

Whaling is similar to spear phishing as it targets specific users. However whaling attacks are different because they are designed to target important people within an organization such as a CEO, Director or Head of Departments such as Finance.

Although spearfishing attacks can be harmful to a business, whaling can have a detrimental effect to everyone within an organization and its customers simply because of the information these people hold.

Smishing

Smishing is a social engineering attack similar to phishing but instead it uses text message / SMS rather than email.

Used for the same reasons as phishing, smishing attacks attempt to trick victims into clicking on links with malware hidden behind them, sharing sensitive information or trick victims into sending money.

In the most common form of Smishing attack, attackers pretend to be a friend or loved one who has changed their phone number and urges the reader to update the number in their phone. Doing this gains trust with the reader and makes the attacker less suspicious when making requests for money or information.

Vishing

Vishing is a form of social engineering that happens over a phone call. This is an older form of social engineering that has been around for a long time.

They act confidently and professionally when calling pretending to be someone from the government, police, the bank or tax authority. They may try and convince you that you owe an amount or that you have an outstanding fine.

Again in this form of attack the attackers always ensure there is a sense of urgency as this makes people panic and are less likely to think about their actions.

Steps you can take to stop attackers impersonating your business

See below information on the settings that can be applied to your email system to mitigate the impersonation of your business.

DMARC is a standard applied to emails that confirms the senders identity. When paired with SPF and DKIM, It stops attackers impersonating your domain by checking back with your email system to confirm that you have sent the email. The attackers email is then set as spam and it will not reach its destination.

We Provide 3rd party spam filtering, O365 security management, MFA (Multi Factor Authentication) setup, O365 secure score management and email backups. Contact us to enquire about protection for your business.

Contact Us Today !

Also see the below resources from the NCSC and NCA for ways to defend your organisation against attackers.

Resources to educate yourself on Phishing and Social Engineering

Please see the below links to trusted government websites and videos to educate yourself and others on Phishing and Social Engineering.

National Cyber Security Centre - Phishing Attacks: Defending your organisation

https://bit.ly/3UPYDa9

National Crime Agency - Cyber Crime

https://bit.ly/3T87EtY

DMARC - How it works

https://bit.ly/3T8BezF

UK Business Directory
Facebook
X (Twitter)
Linkedin
WhatsApp
Email
Print
Reddit
blogger
Digg
Pinterest
Pocket

Filed Under: News Tagged With: DKIM Email Security, DMARC Email Security, Email Spam, Phishing, Smishing, Spear-Phising, Vishing

Sophos Partner, Sophos Silver Partner, Sophos Endpoint Security Microsoft Partner, Microsoft Partner Hampshire Hewlett Packard Enterprise Partner, HP Enterprise Partner, HP Proliant Servers, HP Servers, HP Rack Servers HP Partner, HP Partner Hampshire, HP Partner Southampton Bit Defender Gravity Zone Cyber Essentials Partner logo Dell Partner, Dell Partner Totton, Dell Partner Southampton, Dell Partner Hampshire

Footer

Century IT Services
Mill House Centre
108 Commercial Road
Totton
Southampton
Hampshire
SO40 3AE

GDPR Privacy Notice | Cookie Policy

Sales:         02380 070101
Email:        sales@century‑it.co.uk
Support:   02381 800671

Click for      Location map

Business Directory logo Business Directory, Business Directory Listing
Find us on Glassdoor.

Century IT Services Hampshire

  • E-mail
  • Facebook
  • Instagram
  • LinkedIn
  • Phone
  • Twitter
  • WhatsApp
  • YouTube

Century IT Services is the trading name of Century IT Solutions Ltd. Registered address: Century IT Solutions Ltd., Mill House Centre, 108 Commercial Road, Totton, Southampton SO40 3AE
Registered in England and Wales · Registered Company Number 08287541 · Copyright © 2025 Century IT Solutions Limited · website by Northerwood

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}