{"id":16294,"date":"2020-11-20T14:51:42","date_gmt":"2020-11-20T19:51:42","guid":{"rendered":"https:\/\/www.firewalls.com\/blog\/?p=16294"},"modified":"2025-12-10T15:58:13","modified_gmt":"2025-12-10T20:58:13","slug":"phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/","title":{"rendered":"Anatomy of a Phishing Email &#8211; How to Spot Social Engineering Emails Targeting your Small Business"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"16294\" class=\"elementor elementor-16294\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b7636ca e-flex e-con-boxed e-con e-parent\" data-id=\"2b7636ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ee61184 e-grid e-con-full e-con e-child\" data-id=\"ee61184\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ba5219 elementor-widget elementor-widget-text-editor\" data-id=\"7ba5219\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The local fire department is reaching out to let our small business know that we\u2019ve passed our inspection. Very important! Or is it? Let\u2019s take a close look at an innocuous email that slipped into a <strong><a href=\"https:\/\/www.firewalls.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Firewalls.com<\/a><\/strong> inbox in an article we\u2019re calling \u201c<strong>Anatomy of a Phishing Email<\/strong>.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d915012 e-grid e-con-full e-con e-child\" data-id=\"d915012\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8aafe88 elementor-widget elementor-widget-image\" data-id=\"8aafe88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" data-src=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/FireDept-1024x609.png\" title=\"\" alt=\"\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/609;\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c2ec198 e-grid e-con-full e-con e-child\" data-id=\"c2ec198\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52e1198 elementor-widget elementor-widget-text-editor\" data-id=\"52e1198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><strong>How phishing attacks work<\/strong><\/h3><p><strong>Building false trust<\/strong> &#8211; The above email was definitely targeted. By providing accurate information about our company, street address, and employee names, this attacker was attempting to build trust with the recipient. <strong><a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-social-engineering\" target=\"_blank\" rel=\"noopener noreferrer\">Social engineering<\/a><\/strong> attackers often attempt to impersonate legitimate mail senders by doing pre-emptive research on their targets.<\/p><p><strong>Setting the bait<\/strong> \u2013 Phishing attackers are always on the lookout for some theme to build their scam around. This bait often relates to trending news topics, routine business processes, or impersonating someone you know. In this example, our phisher relied on quarterly fire inspections in an attempt to trick our recipient. Fire inspections are routine, but infrequent enough that the average employee will not have much knowledge about their last checkup. On top of that, the setup sounds critical to everyday business operations at first glance.<\/p><p><strong>Springing the trap<\/strong> \u2013 Fortunately, our team was quick to spot the fake. This attacker wanted our recipient to visit a certain URL where something far more nefarious lies in wait. Here, the attackers provide a hyperlink that they know will not function properly and provide further instructions to manually enter a URL, rerouting victims to their intended trap.<\/p><h3><strong>How can you spot a phishing attempt?<\/strong><\/h3><p>There are several questions you should ask yourself if you think you may be the target of social engineering. Here are a few things that stuck out to Firewalls.com that made us suspicious.<\/p><p>Sender legitimacy \u2013 Is your local fire department really going to send you an invoice by email? Have you ever received an email from this person\/organization before? Most businesses and institutions won\u2019t suddenly reach out to you via a new platform without some warning first. If the legitimacy of the senders gives you pause, you may be a target!<\/p><p><strong>What information do they know about me?<\/strong> \u2013 Building trust by personalizing phishing emails to their target is common sense. You are more likely to believe hackers&#8217; schemes if they seem to have accurate information about you. However, what exactly do they know? In this case, our attacker seems to know an email address, company name, and a physical address. Impressive at first sniff, but this is all publicly available information! Never take the bait just because it has your name on it.<\/p><p><strong>What is being asked of me?<\/strong> \u2013 While the initial setup seems believable enough, this ruse starts to fall apart when you peel back the layers. Why would the fire department send me a link that they know is broken? Why send complicated instructions on how to manually edit URLs to work around a defunct web portal?<\/p><p><strong>Does it all match up?<\/strong> \u2013 If an email says it is from the local fire department, but the send domain contains something completely unrelated (mobile-eyes?), you may be onto something! In this example, the attacker is instructing our recipient to visit a web domain that has nothing to do with fire inspections. More like \u201cmobile-eye-don\u2019t-think-so.\u201d<\/p><h3><strong>What to do if you think you received a phishing email<\/strong><\/h3><p><strong>Never spring the trap<\/strong> &#8211; First and foremost, do not click anything! Links, attachments, replies, forwards\u2014leave it all alone. You cannot be breached simply by receiving the email, so stop while you are ahead.<\/p><p><strong>Get IT involved<\/strong> &#8211; Alert your IT team and immediate supervisors. If you have even an inkling of doubt about the legitimacy of an email, there\u2019s no harm in getting a second opinion from an expert. Reach out to your IT department for further guidance.<\/p><p><strong>Block the sender<\/strong> &#8211; If this is just one attempt in a more persistent or complex spearphishing campaign, there will be further emails brewing. Blocking the email domain of a bad actor prevents a future lapse in judgment or mistake from providing a second point of entry for foiled attackers.<\/p><p><strong>Rely on defense-in-depth<\/strong> &#8211; Want to know the easiest way to sidestep an attempted phishing scam? Do not let it ever land in your inbox. Defense-in-depth network security strategies employ email encryption, cloud-based sandboxing, and <strong>Time-Of-Click protection<\/strong> to provide email security before, during, and after delivery of suspicious messages. Tools such as <strong><a href=\"https:\/\/www.firewalls.com\/blog\/capture-atp\/\" target=\"_blank\" rel=\"noopener noreferrer\">SonicWall Capture Advanced Threat Protection<\/a><\/strong> and <strong><a href=\"https:\/\/www.firewalls.com\/brands\/barracuda-networks\/email-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Barracuda Essentials<\/a><\/strong> take the guesswork out of checking your mailbox.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c9ec9f3 e-grid e-con-full e-con e-child\" data-id=\"c9ec9f3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e70cacc elementor-widget elementor-widget-image\" data-id=\"e70cacc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1272\" height=\"511\" src=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/essentialsarchitecture.jpg\" class=\"attachment-full size-full wp-image-16301\" alt=\"\" srcset=\"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/essentialsarchitecture.jpg 1272w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/essentialsarchitecture-300x121.jpg 300w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/essentialsarchitecture-1024x411.jpg 1024w, https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/essentialsarchitecture-768x309.jpg 768w\" sizes=\"(max-width: 1272px) 100vw, 1272px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-568dc96 e-grid e-con-full e-con e-child\" data-id=\"568dc96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-843e156 elementor-widget elementor-widget-text-editor\" data-id=\"843e156\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Ransomware and malware delivered through phishing emails are more rampant than ever before. Whether hackers are relying on coronavirus scams, election news, Black Friday deals, fire inspections, or otherwise, there\u2019s always some new social engineering scheme on the horizon. Protecting yourself starts with educating yourself against these attacks. Stay safe while holiday shopping!<\/p><h4><strong>Want to learn more about phishing and social engineering?<\/strong><\/h4><p>Check out our <a href=\"https:\/\/www.firewalls.com\/blog\/threat-dictionary\/\">Firewalls.com Threat Dictionary<\/a> entries on ransomware, phishing, and spearphishing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing threatens millions of businesses worldwide with sophisticated targeting schemes. See how to spot a phishing email &#038; protect your small business!<\/p>\n","protected":false},"author":5,"featured_media":27325,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[286],"tags":[98,95,514,96,449],"class_list":["post-16294","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-email-security","tag-phishing","tag-sandboxing","tag-social-engineering","tag-spearphishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com<\/title>\n<meta name=\"description\" content=\"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email &amp; protect your small business!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com\" \/>\n<meta property=\"og:description\" content=\"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email &amp; protect your small business!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Firewalls.com\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/firewallscom\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T19:51:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T20:58:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1120\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andrew Harmon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:site\" content=\"@firewallscom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andrew Harmon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/\"},\"author\":{\"name\":\"Andrew Harmon\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\"},\"headline\":\"Anatomy of a Phishing Email &#8211; How to Spot Social Engineering Emails Targeting your Small Business\",\"datePublished\":\"2020-11-20T19:51:42+00:00\",\"dateModified\":\"2025-12-10T20:58:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/\"},\"wordCount\":846,\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png\",\"keywords\":[\"email security\",\"phishing\",\"sandboxing\",\"social engineering\",\"spearphishing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/\",\"name\":\"Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png\",\"datePublished\":\"2020-11-20T19:51:42+00:00\",\"dateModified\":\"2025-12-10T20:58:13+00:00\",\"description\":\"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email & protect your small business!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png\",\"width\":1120,\"height\":630,\"caption\":\"Anatomy of a Phishing Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/phishing-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Anatomy of a Phishing Email &#8211; How to Spot Social Engineering Emails Targeting your Small Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"name\":\"Firewalls.com\",\"description\":\"Your Home For Cyber Security News, Stories, &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#organization\",\"name\":\"Firewalls.com\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"contentUrl\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/08\\\/BrandedLogo-TagLineBelow.png\",\"width\":365,\"height\":85,\"caption\":\"Firewalls.com\"},\"image\":{\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"http:\\\/\\\/www.facebook.com\\\/firewallscom\",\"https:\\\/\\\/x.com\\\/firewallscom\",\"https:\\\/\\\/www.linkedin.com\\\/company-beta\\\/1439857\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/firewallsDotCom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/#\\\/schema\\\/person\\\/8e89a2f96065af1717d00dfd06dca962\",\"name\":\"Andrew Harmon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g\",\"caption\":\"Andrew Harmon\"},\"description\":\"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.\",\"sameAs\":[\"https:\\\/\\\/www.Firewalls.com\",\"aharmon@firewalls.com\"],\"url\":\"https:\\\/\\\/www.firewalls.com\\\/blog\\\/author\\\/aharmon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com","description":"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email & protect your small business!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com","og_description":"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email & protect your small business!","og_url":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/","og_site_name":"Firewalls.com","article_publisher":"http:\/\/www.facebook.com\/firewallscom","article_published_time":"2020-11-20T19:51:42+00:00","article_modified_time":"2025-12-10T20:58:13+00:00","og_image":[{"width":1120,"height":630,"url":"http:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png","type":"image\/png"}],"author":"Andrew Harmon","twitter_card":"summary_large_image","twitter_creator":"@firewallscom","twitter_site":"@firewallscom","twitter_misc":{"Written by":"Andrew Harmon","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/"},"author":{"name":"Andrew Harmon","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962"},"headline":"Anatomy of a Phishing Email &#8211; How to Spot Social Engineering Emails Targeting your Small Business","datePublished":"2020-11-20T19:51:42+00:00","dateModified":"2025-12-10T20:58:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/"},"wordCount":846,"publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png","keywords":["email security","phishing","sandboxing","social engineering","spearphishing"],"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/","url":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/","name":"Anatomy of a Phishing Email - How to Spot Social Engineering Emails Targeting your Small Business - Firewalls.com","isPartOf":{"@id":"https:\/\/www.firewalls.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png","datePublished":"2020-11-20T19:51:42+00:00","dateModified":"2025-12-10T20:58:13+00:00","description":"Phishing threatens millions of business worldwide with sophisticated targeting schemes. See how to spot a phishing email & protect your small business!","breadcrumb":{"@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.firewalls.com\/blog\/phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#primaryimage","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2020\/11\/Anatomy-of-a-Phishing-Email-\u2013-How-to-Spot-Social-Engineering-Emails-Targeting-your-Small-Business.png","width":1120,"height":630,"caption":"Anatomy of a Phishing Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/www.firewalls.com\/blog\/phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.firewalls.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Anatomy of a Phishing Email &#8211; How to Spot Social Engineering Emails Targeting your Small Business"}]},{"@type":"WebSite","@id":"https:\/\/www.firewalls.com\/blog\/#website","url":"https:\/\/www.firewalls.com\/blog\/","name":"Firewalls.com","description":"Your Home For Cyber Security News, Stories, &amp; Tutorials","publisher":{"@id":"https:\/\/www.firewalls.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.firewalls.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.firewalls.com\/blog\/#organization","name":"Firewalls.com","url":"https:\/\/www.firewalls.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","contentUrl":"https:\/\/www.firewalls.com\/blog\/wp-content\/uploads\/2017\/08\/BrandedLogo-TagLineBelow.png","width":365,"height":85,"caption":"Firewalls.com"},"image":{"@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/firewallscom","https:\/\/x.com\/firewallscom","https:\/\/www.linkedin.com\/company-beta\/1439857\/","https:\/\/www.youtube.com\/user\/firewallsDotCom"]},{"@type":"Person","@id":"https:\/\/www.firewalls.com\/blog\/#\/schema\/person\/8e89a2f96065af1717d00dfd06dca962","name":"Andrew Harmon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/82936bfb8f1442a22d205a04a3feacea2a3566500f61df50f53fa21ec3306ee9?s=96&r=g","caption":"Andrew Harmon"},"description":"Andrew Harmon was the Director of Marketing for Firewalls.com, co-host of the Ping podcast, and engineer-to-English translator of the network security lexicon. Andrew focused on creating content for small business owners and cybersecurity novices to make this crucial facet of modern business more approachable for non-experts everywhere.","sameAs":["https:\/\/www.Firewalls.com","aharmon@firewalls.com"],"url":"https:\/\/www.firewalls.com\/blog\/author\/aharmon\/"}]}},"_links":{"self":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/comments?post=16294"}],"version-history":[{"count":26,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16294\/revisions"}],"predecessor-version":[{"id":27328,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/posts\/16294\/revisions\/27328"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media\/27325"}],"wp:attachment":[{"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/media?parent=16294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/categories?post=16294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.firewalls.com\/blog\/wp-json\/wp\/v2\/tags?post=16294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}