---
description: Phishing attacks pose big threats to companies and spotting them isn’t always easy. GetApp analysed the risks to learn what SMEs should be ready to face.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/getapp/og_logo-94fd2a03a6c7a0e54fc0c9e21a1c0ce9.png
title: Research data: Phishing attack risks for UK SMEs
---

# 94% of phishing attacks arrive by email: what are the risks to UK SMEs?

Canonical: https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks

Published on 04/10/2023 | Written by David Jani.

![94% of phishing attacks arrive by email: what are the risks to UK SMEs?](https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg)

> Being phished is an ever-present danger of the modern internet landscape. UK businesses may represent a key target for hackers due to the data and funds that they may hold and process. These dangers are often assumed to just be an issue for bigger businesses but increasingly, small to mid-sized enterprises (SMEs) could be becoming an attractive target for cybercriminals.

-----

## Article Content

Being phished is an ever-present danger of the modern internet landscape. UK businesses may represent a key target for hackers due to the data and funds that they may hold and process. These dangers are often assumed to just be an issue for bigger businesses but increasingly, small to mid-sized enterprises (SMEs) could be becoming an attractive target for cybercriminals.Press releases published this yearRespondents observed a big rise in phishing attacks since 202094% of phishing attacks arrive via email69% of respondents report phishing attacks when they happenPhishing remains a persistent cybersecurity threatPhishing attacks rose amongst the public during the COVID-19 pandemic according to the ONS,and as such they cannot be taken lightly by businesses. These attacks have the potential to compromise company systems and could allow funds or sensitive data stored in the cloud and on managed devices to be stolen by hackers. What are phishing attacks?Phishing attacks take the form of scam messages or calls from cybercriminals that impersonate trusted institutions or companies with the intention of stealing personal data such as login credentials or bank account information. These messages aim to persuade or manipulate the targets into clicking on compromised links, downloading malware, or directly sharing private or personal information with the scammers.Whilst countermeasures such as email security software can offer protection, it is also vital that SMEs and their employees understand the real risks and consequences of a phishing attack.To investigate the dangers posed to small businesses across the UK from phishing attacks, we surveyed 564 UK staff comprising 349 employees and 215 senior managers, executive managers, and owners, who use a computer for their daily work and have received one or more phishing attacks on company devices. Our full methodology can be found at the end of this article.Respondents observed a big rise in phishing attacks since 2020Our first finding is that there is already a high prevalence of phishing attacks occurring in UK companies. Whilst our sample was selected from a pool of respondents who had experienced a phishing attempt, more than half (67%) had experienced multiple attacks from phishing messages. This rose to 73% of respondents reporting multiple phishing attempts on personal devices. Furthermore, the rate of attacks appeared to be increasing, according to our sample. Many of our participants feel that during the last three years, phishing threats have risen noticeably.In our findings, a combined total of 53% of respondents thought phishing messages had increased by over 20%. However, around a fifth (18%) of the whole sample reported experiencing an increase of over 40%. There is, therefore, no doubt that phishing is a common and persistent threat and one that is only increasing in intensity. In many ways, the growth in phishing attacks is not a great surprise. This aligns with the findings of the latest UK Government Cyber security survey where phishing was identified as the most common type of cyber attack by businesses in the country.   As a result of this increased danger, most senior leaders in our sample are understandably apprehensive about the risks of phishing. In our sample, a combined total of 94% of senior managers, executive management, and owners —a group whom we will refer to as senior manager respondents— said that they saw phishing as a cause for concern at some level. In addition, nearly a third of the same subset of respondents (29%) identified it as a serious concern.  There are many potential negative outcomes that can occur as a result of phishing. Yet, the biggest causes for worry according to senior manager respondents were the possible loss of customers’ private data and financial losses. The increasing number of phishing attacks as well as the severe implications of a breach reported by respondents in our surveys highlights the growing importance of addressing the dangers of phishing attacks as a business. Risks such as a data breach can also have serious impacts on consumer trust, as demonstrated in GetApp’s 2023 building digital trust and identity report. Whether the steps taken involve addressing the problem at its source with the help of anti-spam software or implementing cloud security or network protection, it is important to have a plan in place to limit the harm that could be caused if a breach occurs. 94% of phishing attacks arrive via emailAfter exploring the prevalence of phishing attacks and their consequences, we also wanted to discuss what form these phishing attacks can take. Phishing often takes the form of a digital message. Emails and short message service (SMS) phishing (or ‘Smishing’) offer quick and easy ways to trick employees. However, some cyber criminals also use other means such as robo calls and hacked social media posts to acquire sensitive information from targets. Therefore, knowing where to focus attention on security operations and training is important as hackers can employ many different types of phishing attacks. Naturally, a modern business relies on its digital communications and that may be exactly why cyber criminals seek to exploit them. How does this work in practice when a company becomes a target?In our analysis, receiving a phishing email was by far the most common way phishing scams manifested, as demonstrated in the image below.Although social media is the least likely form of phishing attempt reported by our participants, it should still be taken seriously as criminals could employ evermore audacious tactics to trick users. Recent reports have shown that on X (formerly known as Twitter) consumers have been targeted by accounts impersonating legitimate brand customer service profiles. This suggests that companies need to be monitoring social networks carefully to spot imposters. Tips for SMEsSocial listening tools could offer SMEs a helpful means to spot potential fraudsters. They work by identifying mentions of a company or product online that could be impersonating your communications or social profiles. In GetApp’s 2023 SMEs and social media report, half the sample used social listening which —as well as potentially offering better audience visibility and brand oversight— bestowed helpful benefits such as improved customer relationships and up-to-date product/service feedback.However, whilst it is clear that phishing attacks may be becoming commonplace, there are concerns that they are also becoming more deceptive. 82% of senior managers in our survey believe that phishing messages are getting harder to spot. This is likely to exacerbate the level of risk that companies are exposed to as it becomes harder to discern phishing attacks from legitimate communications.Who are fraudsters impersonating?  A significant element of phishing emails and calls is that they take on the appearance of communications from trusted entities. This makes it harder to detect that the attack is happening and allows the scammer to gain the trust of the target more easily. Upon investigating, we observed five of the most commonly chosen types of phishing attacks by our sample:It was most typical for companies to be impersonated overall, with almost half of the phishing messages taking this form. However, we also saw significantly more trusted organisations such as banks, government agencies, and even coworkers being impersonated in phishing messages amongst our sample. These kinds of specifically deceptive attacks correlate with the finding from senior managers that phishing attempts are getting harder to spot. It appears that cybercriminal tactics are becoming more specialised. This raises the possibility of a situation occurring where trusted business contacts or fellow coworkers are mimicked in order to trick employees into clicking on malicious links. Did you know?Spear phishing is a highly targeted form of phishing used by cybercriminals, typically intended to attack specific people or groups. This could prove to be a particular concern to businesses as hackers may target their companies with spoofed messages impersonating known business contacts, family, and friends, or, as was the case for 24% of our sample, coworkers. These kinds of risks underscore the importance of staff training in security awareness. It is wise to keep employees informed of these new and more underhanded kinds of attacks that can occur so people can be on the lookout for more realistic and specialised impersonations.69% of respondents report phishing attacks when they happenThe data so far has shown that phishing attacks are becoming a bigger threat as time goes on. With the chances increasing of a member of staff accidentally falling for an email or text message scam, what logical steps can be taken if a phishing attack is noticed to limit the potential damage?We investigated these considerations when we questioned our survey sample, and found that a majority (69%) of respondents took the time to report an incident of phishing at work.These are positive findings to observe, suggesting that companies in the UK are in a good position to potentially avoid the worst effects of phishing attacks. A culture of accountability is important for workplace cybersecurity. This is especially true in companies where remote/hybrid work arrangements are practised as IT security teams likely have much less oversight over company devices operated off-site. We spoke to Bryan Altimas, a veteran cyber security and technology risk expert and director of Riverside Court Consulting, to get more information on the factors that could help SMEs stop phishing hackers from succeeding. He advised that it was important to ‘Have a culture in the company where a team member is not scared of reporting they have been phished.’ Fortunately, as seen in the data, the vast majority of our respondents seemed to work in organisations where this rang true. However, there was still 40% of our sample who didn’t notify anyone of the attack. Altimas also offered the following tips for SMEs on what they can do to secure their systems if a phishing attempt initially succeeds. ‘Identify the affected accounts and apps and change the password if you still have access to do so. Once the password is changed log off all devices logged onto the account and set up two-factor authorisation. If the password was shared across apps there are at least two or more apps to secure. Time is of the essence.’Bryan Altimas, Director, Riverside Court ConsultingIt is worth reflecting that the price of inaction or complacency can be very high when it comes to phishing. For respondents unlucky enough to disclose information or click on a malicious link from a phishing attack, the consequences could include issues such as data leaks, reputational damage, and financial losses. These are three things no small company can afford to deal with on a regular basis.Phishing remains a persistent cybersecurity threatAs shown by the data collected from this survey, phishing attacks remain a significant risk for company systems and devices. Being prepared to deal with these dangers, therefore, could be a major challenge for companies, although it is one that they must be ready to respond to. It is important that SMEs consider mitigation methods such as putting in place security filters within email systems to limit the number of spam messages that successfully get through to an employee's inbox. Additionally, it is essential to have a plan set, cybersecurity expertise available, and the correct training and software implemented to fight back if an attack succeeds.   In part two of GetApp’s phishing report, we examine some of the methods that SMEs are using to protect themselves from scam emails and phishing attempts to avoid being caught out. Looking for email security software? Check out our catalogue.

## Disclaimer

> MethodologyThe data for GetApp’s 2023 Phishing Attacks Survey was collected between July-August 2023 and comprises answers from 564 respondents comprising 349 employees and 215 senior managers, executive managers, and owners. We selected our survey sample based on the following criteria:UK residentAged 18-65 years oldEmployed either full-time or part-time with a company with at least two employeesUsing a computer for daily work tasks at least sometimesHas received one or more phishing attacks at work Understands the meaning of phishing attacks after being shown the following definition: ‘Phishing is a common type of cyber attack that targets individuals through email, text messages, phone calls, and other forms of communication usually by impersonating senders known to the recipient (e.g., package delivery, prizes, public entities, etc.). A phishing attack aims to trick the recipient into falling for the attacker’s desired action, such as revealing financial information, system login credentials, or other sensitive information. Phishing attacks are very often perpetrated against companies through their employees.’

## About the author

### David Jani

David is a Content Analyst for the UK, providing key insights into tech, software and business trends for SMEs. Cardiff University graduate. He loves traveling, cooking and F1.

## Related Categories

- [Cloud Security Software](https://www.getapp.co.uk/directory/291/cloud-security/software)
- [Cybersecurity Software](https://www.getapp.co.uk/directory/1035/cybersecurity/software)
- [Help Desk Software](https://www.getapp.co.uk/directory/287/help-desk-ticketing/software)
- [IT Service Software](https://www.getapp.co.uk/directory/1049/it-service/software)
- [Network Security Software](https://www.getapp.co.uk/directory/1443/network-security/software)

## Related Articles

- [Biometric authentication methods: How UK consumers feel about sharing their data](https://www.getapp.co.uk/blog/2002/biometric-authentication-methods)
- [Free trial VPN software: The best 4 tools for your SME](https://www.getapp.co.uk/blog/1635/free-trial-vpn-software-the-best-4-tools-for-your-sme)
- [3 expert tips for small business crisis management](https://www.getapp.co.uk/blog/4256/expert-tips-small-business-crisis-management)
- [Benefits of RFID systems in inventory management](https://www.getapp.co.uk/blog/3513/benefits-of-rfid-systems)
- [How To Prepare Your Enterprise Against Common Cyber Security Threats](https://www.getapp.co.uk/blog/1930/prepare-your-enterprise-against-common-cyber-security-threats)

## Links

- [View on GetApp](https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks)
- [Blog](https://www.getapp.co.uk/blog)
- [Home](https://www.getapp.co.uk/)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"GetApp UK","address":{"@type":"PostalAddress","addressLocality":"Egham","addressRegion":"ENG","postalCode":"TW20 9AH","streetAddress":"Tamesis, The Glanty, Staines-upon-Thames Egham TW20 9AH United Kingdom"},"description":"Review, Compare, and Evaluate small business software. GetApp UK has software offers, SaaS and Cloud Apps, independent evaluations, and reviews.","email":"info@getapp.co.uk","url":"https://www.getapp.co.uk/","logo":"https://dm-localsites-assets-prod.imgix.net/images/getapp/getapp-logo-light-mode-5f7ee07199c9b3b045bc654a55a2b9fa.svg","@id":"https://www.getapp.co.uk/#organization","@type":"Organization","parentOrganization":"Gartner, Inc.","sameAs":["https://twitter.com/GetApp","https://www.linkedin.com/company/getapp-com-a-gartner-company"]},{"name":"GetApp UK","url":"https://www.getapp.co.uk/","@id":"https://www.getapp.co.uk/#website","@type":"WebSite","publisher":{"@id":"https://www.getapp.co.uk/#organization"},"potentialAction":{"query":"required","target":"https://www.getapp.co.uk/search/?q={search_term_string}","@type":"SearchAction","query-input":"required name=search_term_string"}},{"name":"Research data: Phishing attack risks for UK SMEs","description":"Phishing attacks pose big threats to companies and spotting them isn’t always easy. GetApp analysed the risks to learn what SMEs should be ready to face.","url":"https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks","about":{"@id":"https://www.getapp.co.uk/#organization"},"@id":"https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks#webpage","@type":"WebPage","isPartOf":{"@id":"https://www.getapp.co.uk/#website"}},{"description":"Being phished is an ever-present danger of the modern internet landscape. UK businesses may represent a key target for hackers due to the data and funds that they may hold and process. These dangers are often assumed to just be an issue for bigger businesses but increasingly, small to mid-sized enterprises (SMEs) could be becoming an attractive target for cybercriminals.","author":[{"name":"David Jani","@type":"Person"}],"image":{"url":"https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg","@id":"https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks#primaryimage","@type":"ImageObject"},"@type":"BlogPosting","publisher":{"@id":"https://www.getapp.co.uk/#organization"},"articleBody":"&lt;p&gt;&lt;b&gt;Being phished is an ever-present danger of the modern internet landscape. UK businesses may represent a key target for hackers due to the data and funds that they may hold and process. These dangers are often assumed to just be an issue for bigger businesses but increasingly, small to mid-sized enterprises (SMEs) could be becoming an attractive target for cybercriminals.&lt;/b&gt;&lt;/p&gt;&lt;img title=&quot;Phishing-Attacks-Prevelence-UK-GA-HEADER&quot; alt=&quot;SME owners deal with a phishing attack on a giant mobile phone&quot; class=&quot;aligncenter&quot; fetchpriority=&quot;high&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg?w=400 400w, https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg?w=700 700w, https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/4i4EZlhJuVDavthE7KozyG/367783d2d39c8d17cf27f4463caa2bf5/Phishing-Attacks-Prevelence-UK-GA-HEADER.jpg?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;div class=&quot;table-of-contents&quot;&gt;&lt;h2 class=&quot;h3&quot;&gt;Press releases published this year&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;#Respondents-observed-a-big-rise-in-phishing-attacks-since-2020&quot;&gt;Respondents observed a big rise in phishing attacks since 2020&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#94-of-phishing-attacks-arrive-via-email&quot;&gt;94% of phishing attacks arrive via email&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#69-of-respondents-report-phishing-attacks-when-they-happen&quot;&gt;69% of respondents report phishing attacks when they happen&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;#Phishing-remains-a-persistent-cybersecurity-threat&quot;&gt;Phishing remains a persistent cybersecurity threat&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/div&gt;&lt;p&gt;&lt;a href=&quot;https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/articles/phishingattackswhoismostatrisk/2022-09-26&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Phishing attacks rose amongst the public&lt;/a&gt; during the COVID-19 pandemic according to the ONS,&lt;b&gt;&lt;/b&gt;and as such they cannot be taken lightly by businesses. These attacks have the potential to compromise company systems and could allow funds or sensitive data stored in the cloud and on managed devices to be stolen by hackers. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 16 16&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-lightbulb box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 14.5098C4.98035 14.1776 5.24966 13.9083 5.58186 13.9083H10.5491C10.8813 13.9083 11.1506 14.1776 11.1506 14.5098C11.1506 14.842 10.8813 15.1113 10.5491 15.1113H5.58186C5.24966 15.1113 4.98035 14.842 4.98035 14.5098Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 13.5164C4.98035 13.1842 5.24966 12.9149 5.58186 12.9149H10.5491C10.8813 12.9149 11.1506 13.1842 11.1506 13.5164C11.1506 13.8486 10.8813 14.1179 10.5491 14.1179H5.58186C5.24966 14.1179 4.98035 13.8486 4.98035 13.5164Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M8.06549 1.20301C5.38001 1.20301 3.20301 3.38001 3.20301 6.06549C3.20301 7.44115 3.7735 8.68254 4.69241 9.56779C4.9541 9.81989 5.20656 10.1313 5.37115 10.5134L5.97769 11.9214H10.1533L10.7598 10.5134C10.9244 10.1313 11.1769 9.81989 11.4386 9.56779C12.3575 8.68254 12.928 7.44115 12.928 6.06549C12.928 3.38001 10.751 1.20301 8.06549 1.20301ZM2 6.06549C2 2.71561 4.71561 0 8.06549 0C11.4154 0 14.131 2.71561 14.131 6.06549C14.131 7.7813 13.4177 9.33156 12.2732 10.4342C12.0857 10.6148 11.9469 10.7985 11.8647 10.9893L11.1015 12.7609C11.0065 12.9815 10.7893 13.1244 10.5491 13.1244H5.58186C5.34164 13.1244 5.12446 12.9815 5.02943 12.7609L4.26629 10.9893C4.18411 10.7985 4.0453 10.6148 3.85778 10.4342C2.71323 9.33156 2 7.7813 2 6.06549Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path d=&quot;M5.58186 15.0065H10.5491L10.3184 15.468C10.1554 15.794 9.82212 16 9.45759 16H6.67338C6.30885 16 5.9756 15.794 5.81258 15.468L5.58186 15.0065Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;/svg&gt;What are phishing attacks?&lt;/div&gt;Phishing attacks take the form of scam messages or calls from cybercriminals that impersonate trusted institutions or companies with the intention of stealing personal data such as login credentials or bank account information. These messages aim to persuade or manipulate the targets into clicking on compromised links, downloading &lt;a href=&quot;https://www.gartner.com/en/information-technology/glossary/malware&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;malware&lt;/a&gt;, or directly sharing private or personal information with the scammers.&lt;/div&gt;&lt;p&gt;&lt;br/&gt;Whilst countermeasures such as &lt;a href=&quot;/directory/475/email-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;email security software&lt;/a&gt; can offer protection, it is also vital that SMEs and their employees understand the real risks and consequences of a phishing attack.&lt;/p&gt;&lt;p&gt;To investigate the dangers posed to small businesses across the UK from phishing attacks, we surveyed 564 UK staff comprising 349 employees and 215 senior managers, executive managers, and owners, who use a computer for their daily work and have received one or more phishing attacks on company devices. Our full methodology can be found at the end of this article.&lt;/p&gt;&lt;h2 id=&quot;Respondents-observed-a-big-rise-in-phishing-attacks-since-2020&quot;&gt;Respondents observed a big rise in phishing attacks since 2020&lt;/h2&gt;&lt;p&gt;Our first finding is that there is already a high prevalence of phishing attacks occurring in UK companies. Whilst our sample was selected from a pool of respondents who had experienced a phishing attempt, more than half (67%) had experienced multiple attacks from phishing messages. This rose to 73% of respondents reporting multiple phishing attempts on personal devices. &lt;/p&gt;&lt;p&gt;Furthermore, the rate of attacks appeared to be increasing, according to our sample. Many of our participants feel that during the last three years, phishing threats have risen noticeably.&lt;/p&gt;&lt;img title=&quot;phishing-attack-increase-UK-GA-INFOGRAPHIC&quot; alt=&quot;Graph showing the perceived increase in phishing attacks among employees and managers&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/kM70HA7euTnAMM87QyBcv/813a77771f66970388fce3df81fe5702/phishing-attack-increase-UK-GA-INFOGRAPHIC.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;In our findings, a combined total of 53% of respondents thought phishing messages had increased by over 20%. However, around a fifth (18%) of the whole sample reported experiencing an increase of over 40%. There is, therefore, no doubt that phishing is a common and persistent threat and one that is only increasing in intensity. &lt;/p&gt;&lt;p&gt;In many ways, the growth in phishing attacks is not a great surprise. This aligns with the findings of the latest &lt;a href=&quot;https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;UK Government Cyber security survey&lt;/a&gt; where phishing was identified as the most common type of cyber attack by businesses in the country.   &lt;/p&gt;&lt;p&gt;As a result of this increased danger, most senior leaders in our sample are understandably apprehensive about the risks of phishing. In our sample, a combined total of 94% of senior managers, executive management, and owners —a group whom we will refer to as senior manager respondents— said that they saw phishing as a cause for concern at some level. In addition, nearly a third of the same subset of respondents (29%) identified it as a serious concern.  &lt;/p&gt;&lt;p&gt;There are many potential negative outcomes that can occur as a result of phishing. Yet, the biggest causes for worry according to senior manager respondents were the possible loss of customers’ private data and financial losses. &lt;/p&gt;&lt;img title=&quot;implications-of-phishing-attack-UK-GA-INFOGRAPHIC&quot; alt=&quot;Graph displaying most severe consequences of phishing attacks on a UK SME company&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/30xN8v1wugpZxCCJs4IRfL/9aaa61ecc80dc19f1a2bc46e04e2ed35/implications-of-phishing-attack-UK-GA-INFOGRAPHIC.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;The increasing number of phishing attacks as well as the severe implications of a breach reported by respondents in our surveys highlights the growing importance of addressing the dangers of phishing attacks as a business. Risks such as a data breach can also have serious impacts on consumer trust, as demonstrated in &lt;a href=&quot;/blog/3619/what-harms-digital-trust-most&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;GetApp’s 2023 building digital trust and identity report&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;Whether the steps taken involve addressing the problem at its source with the help of &lt;a href=&quot;/directory/1019/anti-spam/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;anti-spam software&lt;/a&gt; or implementing &lt;a href=&quot;/directory/291/cloud-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;cloud security&lt;/a&gt; or &lt;a href=&quot;/directory/1443/network-security/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;network protection&lt;/a&gt;, it is important to have a plan in place to limit the harm that could be caused if a breach occurs. &lt;/p&gt;&lt;h2 id=&quot;94-of-phishing-attacks-arrive-via-email&quot;&gt;94% of phishing attacks arrive via email&lt;/h2&gt;&lt;p&gt;After exploring the prevalence of phishing attacks and their consequences, we also wanted to discuss what form these phishing attacks can take. Phishing often takes the form of a digital message. Emails and short message service (SMS) phishing (or ‘Smishing’) offer quick and easy ways to trick employees. However, some cyber criminals also use other means such as robo calls and hacked social media posts to acquire sensitive information from targets. &lt;/p&gt;&lt;p&gt;Therefore, knowing where to focus attention on security operations and training is important as hackers can employ many different types of phishing attacks. Naturally, a modern business relies on its digital communications and that may be exactly why cyber criminals seek to exploit them. How does this work in practice when a company becomes a target?&lt;/p&gt;&lt;p&gt;In our analysis, receiving a phishing email was by far the most common way phishing scams manifested, as demonstrated in the image below.&lt;/p&gt;&lt;img title=&quot;Phishing-attack-media-UK-GA-INFOGRAPHIC&quot; alt=&quot;Phishing attacks received by media formats&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/71KHT2HzJv1jVmjPCjUTKC/d34e081498e06923534c77053f19f5c9/Phishing-attack-media-UK-GA-INFOGRAPHIC.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;Although social media is the least likely form of phishing attempt reported by our participants, it should still be taken seriously as criminals could employ evermore audacious tactics to trick users. Recent reports have shown that on X (formerly known as Twitter) &lt;a href=&quot;https://www.theguardian.com/technology/2023/aug/27/consumers-complaining-x-targeted-scammers-verification-changes-twitter&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;consumers have been targeted&lt;/a&gt; by accounts impersonating legitimate brand customer service profiles. This suggests that companies need to be monitoring social networks carefully to spot imposters. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 16 16&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-lightbulb box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 14.5098C4.98035 14.1776 5.24966 13.9083 5.58186 13.9083H10.5491C10.8813 13.9083 11.1506 14.1776 11.1506 14.5098C11.1506 14.842 10.8813 15.1113 10.5491 15.1113H5.58186C5.24966 15.1113 4.98035 14.842 4.98035 14.5098Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M4.98035 13.5164C4.98035 13.1842 5.24966 12.9149 5.58186 12.9149H10.5491C10.8813 12.9149 11.1506 13.1842 11.1506 13.5164C11.1506 13.8486 10.8813 14.1179 10.5491 14.1179H5.58186C5.24966 14.1179 4.98035 13.8486 4.98035 13.5164Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path fill-rule=&quot;evenodd&quot; clip-rule=&quot;evenodd&quot; d=&quot;M8.06549 1.20301C5.38001 1.20301 3.20301 3.38001 3.20301 6.06549C3.20301 7.44115 3.7735 8.68254 4.69241 9.56779C4.9541 9.81989 5.20656 10.1313 5.37115 10.5134L5.97769 11.9214H10.1533L10.7598 10.5134C10.9244 10.1313 11.1769 9.81989 11.4386 9.56779C12.3575 8.68254 12.928 7.44115 12.928 6.06549C12.928 3.38001 10.751 1.20301 8.06549 1.20301ZM2 6.06549C2 2.71561 4.71561 0 8.06549 0C11.4154 0 14.131 2.71561 14.131 6.06549C14.131 7.7813 13.4177 9.33156 12.2732 10.4342C12.0857 10.6148 11.9469 10.7985 11.8647 10.9893L11.1015 12.7609C11.0065 12.9815 10.7893 13.1244 10.5491 13.1244H5.58186C5.34164 13.1244 5.12446 12.9815 5.02943 12.7609L4.26629 10.9893C4.18411 10.7985 4.0453 10.6148 3.85778 10.4342C2.71323 9.33156 2 7.7813 2 6.06549Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;path d=&quot;M5.58186 15.0065H10.5491L10.3184 15.468C10.1554 15.794 9.82212 16 9.45759 16H6.67338C6.30885 16 5.9756 15.794 5.81258 15.468L5.58186 15.0065Z&quot; fill=&quot;black&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Tips for SMEs&lt;/div&gt;&lt;a href=&quot;/directory/3833/social-listening-tools/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Social listening&lt;/a&gt; tools could offer SMEs a helpful means to spot potential fraudsters. They work by identifying mentions of a company or product online that could be impersonating your communications or social profiles. In GetApp’s &lt;a href=&quot;/blog/3472/social-media-trends-smes&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;2023 SMEs and social media report&lt;/a&gt;, half the sample used social listening which —as well as potentially offering better audience visibility and brand oversight— bestowed helpful benefits such as improved customer relationships and up-to-date product/service feedback.&lt;/div&gt;&lt;p&gt;However, whilst it is clear that phishing attacks may be becoming commonplace, there are concerns that they are also becoming more deceptive. 82% of senior managers in our survey believe that phishing messages are getting harder to spot. This is likely to exacerbate the level of risk that companies are exposed to as it becomes harder to discern phishing attacks from legitimate communications.&lt;/p&gt;&lt;h3&gt;Who are fraudsters impersonating?  &lt;/h3&gt;&lt;p&gt;A significant element of phishing emails and calls is that they take on the appearance of communications from trusted entities. This makes it harder to detect that the attack is happening and allows the scammer to gain the trust of the target more easily. &lt;/p&gt;&lt;p&gt;Upon investigating, we observed five of the most commonly chosen types of phishing attacks by our sample:&lt;/p&gt;&lt;img title=&quot;Phishing-attack-types-UK-GA-INFOGRAPHIC&quot; alt=&quot;Graph of the topic of the phishing attacks received by UK workers&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/7N0jqCmWvCEkjdIYDEuUym/e630f258ed27874c6be78900e65cb4cf/Phishing-attack-types-UK-GA-INFOGRAPHIC.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;It was most typical for companies to be impersonated overall, with almost half of the phishing messages taking this form. However, we also saw significantly more trusted organisations such as banks, government agencies, and even coworkers being impersonated in phishing messages amongst our sample. &lt;/p&gt;&lt;p&gt;These kinds of specifically deceptive attacks correlate with the finding from senior managers that phishing attempts are getting harder to spot. It appears that cybercriminal tactics are becoming more specialised. This raises the possibility of a situation occurring where trusted business contacts or fellow coworkers are mimicked in order to trick employees into clicking on malicious links. &lt;/p&gt;&lt;div class=&quot;box-hint&quot;&gt;&lt;div class=&quot;box-header fw-700 mb-4&quot;&gt;&lt;svg viewbox=&quot;0 0 26 28&quot; aria-hidden=&quot;true&quot; class=&quot;icon icon-star box-header__icon align-middle mb-1 me-2&quot;&gt;&lt;path d=&quot;M26 10.109c0 0.281-0.203 0.547-0.406 0.75l-5.672 5.531 1.344 7.812c0.016 0.109 0.016 0.203 0.016 0.313 0 0.406-0.187 0.781-0.641 0.781-0.219 0-0.438-0.078-0.625-0.187l-7.016-3.687-7.016 3.687c-0.203 0.109-0.406 0.187-0.625 0.187-0.453 0-0.656-0.375-0.656-0.781 0-0.109 0.016-0.203 0.031-0.313l1.344-7.812-5.688-5.531c-0.187-0.203-0.391-0.469-0.391-0.75 0-0.469 0.484-0.656 0.875-0.719l7.844-1.141 3.516-7.109c0.141-0.297 0.406-0.641 0.766-0.641s0.625 0.344 0.766 0.641l3.516 7.109 7.844 1.141c0.375 0.063 0.875 0.25 0.875 0.719z&quot;&gt;&lt;/path&gt;&lt;/svg&gt;Did you know?&lt;/div&gt;Spear phishing is a highly targeted form of phishing used by cybercriminals, typically intended to attack specific people or groups. This could prove to be a particular concern to businesses as hackers may target their companies with spoofed messages impersonating known business contacts, family, and friends, or, as was the case for 24% of our sample, coworkers. &lt;/div&gt;&lt;p&gt;These kinds of risks underscore the importance of &lt;a href=&quot;/directory/3809/security-awareness-training/software&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;staff training in security awareness&lt;/a&gt;. It is wise to keep employees informed of these new and more underhanded kinds of attacks that can occur so people can be on the lookout for more realistic and specialised impersonations.&lt;/p&gt;&lt;h2 id=&quot;69-of-respondents-report-phishing-attacks-when-they-happen&quot;&gt;69% of respondents report phishing attacks when they happen&lt;/h2&gt;&lt;p&gt;The data so far has shown that phishing attacks are becoming a bigger threat as time goes on. With the chances increasing of a member of staff accidentally falling for an email or text message scam, what logical steps can be taken if a phishing attack is noticed to limit the potential damage?&lt;/p&gt;&lt;p&gt;We investigated these considerations when we questioned our survey sample, and found that a majority (69%) of respondents took the time to report an incident of phishing at work.&lt;/p&gt;&lt;img title=&quot;Phishing-attack-response-UK-GA-INFOGRAPHIC&quot; alt=&quot;Graph of responses to receipt of phishing messages/calls&quot; class=&quot;aligncenter&quot; loading=&quot;lazy&quot; src=&quot;https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png&quot; srcset=&quot;https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png?w=400 400w, https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png?w=700 700w, https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png?w=1000 1000w, https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png?w=1500 1500w, https://images.ctfassets.net/63bmaubptoky/6QDrcHHTkvPX8PhnQpuvaO/9cd0f5e929d9438ef96b4430b0e79905/Phishing-attack-response-UK-GA-INFOGRAPHIC.png?w=2200 2200w&quot; sizes=&quot;(min-resolution: 2x) 2200px, (min-width: 992px) 1000px, 95vw&quot;/&gt;&lt;p&gt;These are positive findings to observe, suggesting that companies in the UK are in a good position to potentially avoid the worst effects of phishing attacks. A culture of accountability is important for workplace cybersecurity. This is especially true in companies where &lt;a href=&quot;/blog/4161/employee-practices-remote-work-data-security&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;remote/hybrid work arrangements&lt;/a&gt; are practised as IT security teams likely have much less oversight over company devices operated off-site. &lt;/p&gt;&lt;p&gt;We spoke to &lt;a href=&quot;https://uk.linkedin.com/in/bryan-altimas-cyber&quot; rel=&quot;nofollow noopener noreferrer&quot; target=&quot;_blank&quot;&gt;Bryan Altimas&lt;/a&gt;, a veteran cyber security and technology risk expert and director of Riverside Court Consulting, to get more information on the factors that could help SMEs stop phishing hackers from succeeding. &lt;/p&gt;&lt;p&gt;He advised that it was important to ‘Have a culture in the company where a team member is not scared of reporting they have been phished.’ Fortunately, as seen in the data, the vast majority of our respondents seemed to work in organisations where this rang true. However, there was still 40% of our sample who didn’t notify anyone of the attack. &lt;/p&gt;&lt;p&gt;Altimas also offered the following tips for SMEs on what they can do to secure their systems if a phishing attempt initially succeeds. &lt;/p&gt;&lt;blockquote&gt;‘Identify the affected accounts and apps and change the password if you still have access to do so. Once the password is changed log off all devices logged onto the account and set up two-factor authorisation. If the password was shared across apps there are at least two or more apps to secure. Time is of the essence.’&lt;footer&gt;Bryan Altimas, Director, Riverside Court Consulting&lt;/footer&gt;&lt;/blockquote&gt;&lt;p&gt;It is worth reflecting that the price of inaction or complacency can be very high when it comes to phishing. For respondents unlucky enough to disclose information or click on a malicious link from a phishing attack, the consequences could include issues such as data leaks, reputational damage, and financial losses. These are three things no small company can afford to deal with on a regular basis.&lt;/p&gt;&lt;h2 id=&quot;Phishing-remains-a-persistent-cybersecurity-threat&quot;&gt;Phishing remains a persistent cybersecurity threat&lt;/h2&gt;&lt;p&gt;As shown by the data collected from this survey, phishing attacks remain a significant risk for company systems and devices. &lt;/p&gt;&lt;p&gt;Being prepared to deal with these dangers, therefore, could be a major challenge for companies, although it is one that they must be ready to respond to. It is important that SMEs consider mitigation methods such as putting in place security filters within email systems to limit the number of spam messages that successfully get through to an employee&amp;#39;s inbox. Additionally, it is essential to have a plan set, cybersecurity expertise available, and the correct training and software implemented to fight back if an attack succeeds.   &lt;/p&gt;&lt;p&gt;In &lt;a href=&quot;/blog/4334/phishing-awareness-training-safeguard-smes&quot; rel=&quot;noopener noreferrer&quot; target=&quot;_blank&quot;&gt;part two of GetApp’s phishing report&lt;/a&gt;, we examine some of the methods that SMEs are using to protect themselves from scam emails and phishing attempts to avoid being caught out. &lt;/p&gt;&lt;div class=&quot;box-idea&quot;&gt;Looking for &lt;a href=&quot;/directory/475/email-security/software&quot; rel=&quot;noopener noreferrer&quot; class=&quot;evnt&quot; data-evac=&quot;ua_click&quot; data-evca=&quot;Blog_idea&quot; data-evna=&quot;engagement_blog_product_category_click&quot; target=&quot;_blank&quot;&gt;email security software&lt;/a&gt;? Check out our catalogue.&lt;/div&gt;&lt;p&gt;&lt;/p&gt;","dateModified":"2023-11-15T14:33:53.000000Z","datePublished":"2023-10-04T16:00:00.000000Z","headline":"94% of phishing attacks arrive by email: what are the risks to UK SMEs?","inLanguage":"en-GB","mainEntityOfPage":"https://www.getapp.co.uk/blog/4224/risks-uk-smes-phishing-attacks#webpage"}]}
</script>
