What is phishing and why email filters aren't enough
Phishing is a type of cyberattack in which threat actors impersonate trusted people or organizations to trick victims into handing over credentials, clicking on malicious links, or transferring money. The name comes from "fishing" — attackers cast a wide net and wait for someone to bite. Email phishing scams are by far the most common delivery method, but phishing has expanded to SMS (smishing), voice calls (vishing), and even QR codes.
What makes modern phishing so dangerous isn't just the volume — it's the sophistication. AI-powered tools let attackers craft grammatically perfect messages that mirror your company's exact communication style. They study your organization's structure, timing, and branding to make their lures nearly indistinguishable from the real thing. According to CISA Around 90% of cyber incidents start with phishing emails.
Traditional spam filters work by matching known malicious senders, flagging suspicious domains, and scanning links against blocklists. That approach catches a lot — but it has a critical blind spot. Filters are designed to evaluate incoming mail from external sources and are not as effective against novel tradecraft/zero-days. When an attacker uses a compromised Microsoft 365 account to send phishing emails internally, those messages originate from a trusted, authenticated source. The filter sees a legitimate user sending mail and lets it through.
This is why phishing protection can't stop at the email gateway. You need visibility into identity behavior — what accounts are doing after authentication — not just what's arriving at the perimeter.
How can you recognize a phishing email?
Knowing what to look for is your employees' first line of defense. While modern phishing attacks are far more convincing than the typo-ridden scam emails of the past, most still share a set of recognizable warning signs:
Sender address mismatches: The display name looks legitimate, but the actual email domain is off — a subtle misspelling like "micros0ft.com" or an unrelated domain entirely.
Urgency and pressure tactics: Messages demanding immediate action, threatening account suspension, or claiming your security has been compromised are designed to bypass critical thinking.
Generic greetings: "Dear Customer" or "Dear Account Holder" instead of your actual name.
Unexpected attachments: Unsolicited files, especially executables, compressed archives, or documents asking you to enable macros, should always raise a red flag.
Suspicious URLs: Before clicking any link, hover over it to reveal the true destination. Phishing emails routinely hide malicious URLs behind innocent-looking anchor text.
Requests for sensitive information: Legitimate organizations never ask for passwords, Social Security numbers, or payment details via email.
Too-good-to-be-true offers: Prize notifications, unexpected refunds, or exclusive opportunities you didn't sign up for are classic phishing bait.
For a deeper breakdown of what to watch for, see our guide onhow to spot a phishing email.