Protect your data and update your equipment
Although the use of email for the purposes of phishing is very common, it is not the only source; SMS messages, phone calls and instant messages can also be used to this end. Bearing in mind that malicious communications are progressively more difficult to detect, make sure that both you and your team are asking yourselves these questions before taking action:
If in doubt, verify the information with a trusted source, such as an official website or telephone number stored in your list of contacts. If you fail to verify the information, report it.
Infographic: How to detect phishing
Cybercriminals might also try to claim to be from your company and deceive your customers or suppliers. To help prevent this from happening: