What Is Phishing? 6 Common Cyber Security Exploits Explained

illustration of a pdf getting hooked by a fishing reel to represent what is phishing

Picture this: Simone is the head of an acquisition team that is in the final round of competing for a huge deal. The morning of the big presentation, she gets up early and sees a Dropbox link from a team member with the subject “Urgent updates for today’s meeting.” 

Simone is puzzled, as she isn’t expecting further changes, but clicks the link anyway and signs in to open the document. She realizes her mistake immediately. There is nothing to view, just a blank error page. Simone had accidentally fallen for a phishing attack, putting her personal information—and the company’s security—at risk.

If you’ve spent any significant amount of time on the internet, you can probably sympathize with Simone’s story. Phishing scams are ubiquitous in our hyper-connected online society. Anyone with an active email account has likely received a phishing email as millions of fraudulent messages are pumped out daily.

But there’s more to phishing than just simple bait-and-switch scenarios. Read on to learn more about phishing, common types of phishing attacks and the steps you can take to help avoid getting hooked by email scams.

What is phishing? 

Phishing is an umbrella term for various fraudulent methods of obtaining data and/or sensitive information via electronic communication. Most phishing attacks arrive by email and are sent by cyberattackers who disguise themselves as another entity in order to access your information.

If you think you’re too savvy to fall for a scam, think again. According to a McAfee® and Center for Strategic and International Studies report, nearly two-thirds of the two billion people who use online services have had their data stolen or compromised.1 Anyone with an email account or online presence can be targeted by phishing scams. The negative effects for companies and organizations can be severe. The most common consequences of a successful phishing attack are loss of data, compromised credentials and accounts, installation of ransomware and malware, and financial losses. Those losses can be substantial—IBM® reports the global average cost of a data breach in 2020 was $3.86 million.2

What do cyberattackers gain by phishing? 

Unsurprisingly, access to information and money are nearly always the end goals of phishing attacks. Perpetrators of phishing crimes can make ill-gotten financial gains in a myriad of ways. A few examples include selling passwords, personal information and data; threatening disclosure of private or sensitive materials in exchange for a ransom; hacking into bank accounts; stealing credentials and identities; and installing malware. 

Types of phishing attacks 

The people behind these cybercrimes are constantly evolving their tactics and finding new ways exploit people and organizations. Read on to learn more about the different types of phishing attacks being used on a regular basis.


Spoofing, or intentionally misrepresenting the source or identity of a communication to appear as though it is from a trusted source, is the bread and butter of phishing scams. Criminals most commonly spoof email addresses, domains and IP addresses to trick people into engaging with their malicious links or software. This works to great effect because people are much more likely to open an email from an entity they know or use.

Spear phishing

Spear phishing is a highly targeted scam designed to trick a person or small group of people. In contrast to broad-based phishing attempts, the emails or other electronic communications used are much more customized for the intended recipient. To spear phish successfully, criminals use publicly available information about their targets to make the scam as convincing as possible. Even something simple, like knowing where a target lives or the online accounts a target uses, can help scammers craft their attacks. 


Whaling uses the same tactics as spear phishing but with a hyper-specific focus on prominent, high-value targets. To land a successful whaling attack, cybercriminals will carefully select a senior or high-level leader at an organization and pretend to be a friend or trusted colleague. This tactic is a type of business email compromise (BEC) and is sometimes known as CEO fraud. Phishers are experts in forging emails, websites and credentials to make it seem like a legitimate message from a coworker.

Executives and other high-profile individuals should take extra care in curating their online presence. Sharing personal information—even everyday things, like birthdays, job titles, vacations or relationships—can be used by criminals to tailor attacks.

Clone phishing

As the word “clone” implies, this kind of attack uses a real, previously sent email and sends it again—but with dangerous additions. Scammers will replace legitimate links or attachments with malware, viruses or ransomware to trick receivers into thinking that they came from a trusted source. This kind of scam is particularly insidious because a busy employee with lots of emails in their inbox is likely to click it without hesitation.

How to stay off the phishing hook 

Your cybersecurity will have to be layered and multi-pronged to be effective. Some helpful tips for combating phishing scams are:

  • Adopt a risk-aware mindset about phishing scams. Simple training and repetition can help build good habits. 
  • Watch out for classic tell-tale signs of a scam, like misspellings or discrepancies in names, URLs, sender info, websites and grammatical errors. 
  • Utilize a password manager to reduce the hassle of having complex and unique passwords. 
  • Use email signing certificates for highly visible employees, like CEOs and leadership, who may be targeted.
  • Be cautious about using public Wi-Fi. Never download an app or give personal information in exchange for free internet.
  • Maintain robust cybersecurity programs. Use email filters, antivirus software and VPNs. 

Combat scammers with a career in cybersecurity 

Scammers never sleep, and organizations are under more pressure than ever to keep their data and information secure. While the negative effects of phishing and other malicious internet activities are certainly substantial, there’s a silver lining for tech professionals. Organizations need highly skilled help to keep their networks secure and the damage from security failures minimal. Could earning a Cyber Security degree be the right move for you? Our article “Is a Cyber Security Degree Worth It? Analyzing the Facts” can help you decide.

1James Lewis “The Economic Impact of Cybercrime – No Slowing Down” McAfee and the Center for Strategic International Studies, February 2018 [accessed April 2021] https://www.csis.org/analysis/economic-impact-cybercrime
2IBM, “Cost of a Data Breach Report 2020 Highlights” [accessed April 2021] https://www.ibm.com/downloads/cas/QMXVZX6R

McAfee is a registered trademark of McAfee, LLC.
IBM is a registered trademark of International Business Machines

Kelly Petersen

Kelly is a content specialist at Collegis Education, where she researches and writes about a variety of topics on behalf of Rasmussen University. She is passionate about education and previously worked as an English as a Second Language (ESL) teacher in Spain and as a higher education communications specialist in Costa Rica.

Kelly Petersen

Related Content

This piece of ad content was created by Rasmussen University to support its educational programs. Rasmussen University may not prepare students for all positions featured within this content. Please visit www.rasmussen.edu/degrees for a list of programs offered. External links provided on rasmussen.edu are for reference only. Rasmussen University does not guarantee, approve, control, or specifically endorse the information or products available on websites linked to, and is not endorsed by website owners, authors and/or organizations referenced. Rasmussen University is accredited by the Higher Learning Commission, an institutional accreditation agency recognized by the U.S. Department of Education.

logo-accreditation-acenlogo-accreditation-ccnechart-credential-laddering-associates-bachelors-masters0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-associates-bachelors0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-healthcare-management0 Credits90 Credits180 Credits48 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTSStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE’S DEGREEStart HereMASTER’S DEGREEPURSUERSEnd HereBACHELOR’S DEGREEEnd HereMASTER’S DEGREEchart-credential-laddering-rsb0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS90 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsd0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsjs0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE180 CreditsEnd HereBACHELOR'S DEGREEchart-credential-laddering-rsn0 CreditsStart HereHIGH SCHOOL GRADSStart HereTRANSFER STUDENTS91 CreditsStart HereSECOND DEGREE PURSUERSEnd HereASSOCIATE'S DEGREE181 CreditsEnd HereBACHELOR'S DEGREEicon-colored-outline-bankicon-colored-outline-certificateicon-colored-outline-circle-dollar-signicon-colored-outline-folder-searchicon-colored-outline-hand-hearticon-colored-outline-head-blocksicon-colored-outline-head-cogicon-colored-outline-head-hearticon-colored-outline-health-plus-leavesicon-colored-outline-hospitalicon-colored-outline-lifelong-learningicon-colored-outline-light-bulb-analyticsicon-colored-outline-maginify-glassicon-colored-outline-magnifying-glassicon-colored-outline-monitor-healthcareicon-colored-outline-monitor-paper-searchicon-colored-outline-nurse-raysicon-colored-outline-padlock-shieldicon-colored-outline-scalesicon-bankicon-general-charticon-general-connecticon-general-degreeicon-general-discussicon-general-emailicon-general-findicon-general-haticon-general-hearticon-general-laptop-buildingicon-general-laptopicon-general-leadericon-general-mapicon-general-moneyicon-general-paperworkicon-general-peopleicon-general-phoneicon-general-speak-outicon-head-hearticon-mglassicon-scalesrebrand-arrowsicon-colored-advanceicon-colored-arrows-cross-curveicon-colored-briefcase-staricon-colored-buildicon-colored-bulb-analyticsicon-colored-certificateicon-colored-continual-developmenticon-colored-duo-chatboxicon-colored-folder-mortarboardicon-colored-forward-ribbonicon-colored-gears-clockicon-colored-globe-penicon-colored-growthicon-colored-hand-bubbleicon-colored-hand-starsicon-colored-hands-gearicon-colored-head-blocksicon-colored-head-cogicon-colored-laptop-cbe-skyscrapericon-colored-laptop-checkmarkicon-colored-laptop-webpageicon-colored-location-mapicon-colored-location-pinicon-colored-monitor-paper-scanicon-colored-mortarboard-dollaricon-colored-nationalicon-colored-people-chat-bubblesicon-colored-person-cheer-staricon-colored-person-laptop-checkboxesicon-colored-person-screen-instructoricon-colored-person-whiteboardicon-colored-phone-chatboxicon-colored-police-lighticon-colored-prepicon-colored-presentericon-colored-regionalicon-colored-save-timeicon-colored-shirt-haticon-colored-skyscrapericon-colored-stateicon-colored-student-centeredicon-colored-supporticon-colored-world-experienceicon-arrowicon-cameraicon-filtericon-info-circleicon-mail-forwardicon-play-solidicon-quote-mark-lefticon-quote-mark-righticon-share-square-oicon-spinnericon-tagicon-simple-chaticon-simple-desktopicon-simple-findicon-simple-hamburgericon-simple-phoneicon-testimonial-quotesicon-social-facebook-square-coloredicon-social-facebook-squareicon-social-facebookicon-social-google-plus-squareicon-social-google-plusicon-social-instagramicon-social-linkedin-square-coloredicon-social-linkedin-squareicon-social-linkedinicon-social-pinterest-picon-social-twitter-squareicon-social-twittericon-social-youtube-play-coloredicon-social-youtube-playlogo-rasu-horizontalras-logo-flameras-logo-horizontalras-logo-stackedicon-util-checkbox-whiteicon-util-checkboxicon-util-checked-whiteicon-util-checkedicon-util-chevron-downicon-util-chevron-lefticon-util-chevron-righticon-util-chevron-upicon-util-language-switchicon-util-loadingicon-util-open-window-buttonicon-util-open-window-linkicon-util-pdf-buttonicon-util-pdf-linkicon-util-refreshicon-util-x