UK businesses face phishing attacks targeting employee credentials and sensitive data. A practical framework for email security and staff training.

Phishing attacks against UK businesses have increased 85% year-over-year. Phishing is the most common attack vector: 64% of breaches begin with a phishing email. Unlike sophisticated zero-day exploits or advanced malware, phishing attacks are simple, scalable, and remarkably effective. Attackers send thousands of convincing emails knowing that a small percentage will succeed.
UK organisations are specifically targeted because phishing is highly profitable. A single successful phishing attack can compromise employee credentials, providing attackers access to company systems, customer data, and financial accounts. Phishing costs UK businesses an estimated £3 billion annually in direct losses, remediation, and lost productivity.
The sophistication of phishing attacks has increased dramatically. Modern phishing emails are nearly indistinguishable from legitimate communications. Attackers use spoofed email addresses, company logos, realistic content, and personalisation to increase credibility. They impersonate trusted senders: management, IT support, external partners, regulators, or service providers.
Smaller organisations face the greatest risk. They often lack advanced email security tools, provide minimal phishing awareness training, and don't monitor email activity for suspicious patterns. Attackers know small businesses are under-resourced and over-vulnerable.
Recent phishing trends show increasing targeted sophistication. Business Email Compromise (BEC) attacks impersonate executives requesting urgent wire transfers or payment approvals. These attacks target finance and operations staff, often requesting unusual payment destinations. Recent BEC attacks have resulted in individual losses exceeding £1 million.
Credential harvesting phishing directs staff to fake login pages resembling legitimate company systems, email providers, or cloud services. Once staff enter credentials, attackers gain access to email, cloud storage, and business applications. Compromised credentials are then used for lateral movement toward high-value targets: financial systems, customer databases, or intellectual property.
Supply chain phishing targets employees through fake communications from vendors, suppliers, or service providers. Attackers know employees trust vendor communications and are less suspicious than with external emails. A single compromised vendor account can be used to attack hundreds of customer organisations simultaneously.
Spear phishing is highly targeted and personalised. Attackers research individuals using LinkedIn, social media, and company websites, then craft emails tailored to specific targets. Spear phishing success rates are 10x higher than generic phishing because the emails appear legitimate and relevant. See AMVIA's cybersecurity services for comprehensive email security frameworks.
Phishing attacks follow a predictable chain. Understanding each stage enables targeted prevention.
Attackers send phishing emails to targeted recipients. Email addresses are obtained from public sources (LinkedIn, company websites), data broaches, or purchased from cybercriminal markets. Emails are crafted to appear legitimate using company branding, realistic content, and urgency ("act now", "urgent action required").
The phishing email arrives in the user's inbox. Email security filters may catch some emails, but sophisticated phishing often bypasses automated defences. The user receives the email and makes a decision: click a link, download an attachment, or reply with information.
The user clicks a malicious link or downloads a malicious attachment. Link clicks may direct to credential harvesting pages or trigger malware downloads. Attachment downloads may execute malware on the user's device. Email credentials are harvested or malware establishes persistence on the device.
With harvested credentials or compromised device, attackers gain access to company systems. They use stolen credentials to log into email, cloud storage, or business applications. From there, they conduct reconnaissance and move laterally toward higher-value targets.
Attackers use initial access as a launching point. They move through networks, escalate privileges, identify sensitive data or financial systems, and plan attacks. This stage can last days or weeks while attackers remain undetected.
Once positioned, attackers take action: exfiltrate data, deploy ransomware, manipulate financial transactions, or cause operational disruption. See ransomware protection for details on ransomware deployment following phishing compromise.
This layer stops phishing emails before they reach users. Layer 1 includes: email filtering blocking known phishing domains, anti-spoofing controls (DMARC, SPF, DKIM) preventing domain spoofing, real-time phishing detection using machine learning, sandboxing suspicious attachments, and URL rewriting for link protection. Prevention is the highest-ROI investment.
For phishing specifically: implement DMARC policy in enforce mode (not monitoring mode) to prevent domain spoofing. Deploy real-time phishing detection analysing email content, sender reputation, and link reputation. Enable URL rewriting so malicious links are detected even if they bypass initial screening. Use sandboxing to detonate suspicious attachments in isolated environments before delivery. Configure email security to quarantine suspicious emails for manual review rather than deleting them.
Even with strong email security, some phishing emails reach users. Layer 2 ensures users can identify phishing and report it. This includes: user-friendly reporting mechanisms (one-click phishing report buttons), security awareness training teaching phishing recognition, phishing simulations identifying vulnerable staff, and monitoring reported emails for patterns.
For phishing specifically: enable users to report suspicious emails with a single click. Train staff on phishing tactics: urgency, requests for credentials, unexpected attachments, suspicious sender addresses (even if name looks correct), and generic greetings. Conduct phishing simulations monthly, measuring click rates and report rates. Identify staff who frequently fall for simulations and provide targeted re-training. See remote worker security for additional considerations for distributed staff.
When phishing succeeds (and it will), Layer 3 minimizes damage. This includes: multi-factor authentication (MFA) preventing credential misuse, conditional access policies detecting unusual access patterns, rapid password reset capability, and incident response procedures.
For phishing specifically: enforce MFA on all accounts, especially email and cloud services. Use conditional access policies requiring additional verification for unusual access: new location, new device, unusual time, impossible travel. Monitor for email forwarding rules (attackers often set up email forwarding to external addresses). Detect for suspicious login patterns: multiple failed attempts followed by success. Establish procedures for rapid password reset if phishing is suspected. Have incident response procedures for credential compromise: revoke compromised credentials, review account activity, assess scope of compromise.
Assess current phishing risk: what email security tools exist? Have staff completed training? Conduct a phishing simulation baseline to understand vulnerability. Develop comprehensive security awareness training programme. Assign accountability for phishing resilience.
Implement or upgrade email security with anti-spoofing, real-time phishing detection, and URL protection. Deploy email user interface features for reporting phishing. Launch staff security awareness training covering phishing tactics, credential security, and reporting procedures. Run first phishing simulation after training to measure effectiveness.
Enforce MFA on all email and cloud application access. Implement conditional access policies. Deploy monitoring for email forwarding rules and suspicious login patterns. Establish alert procedures for suspicious activity. Develop credential compromise incident response procedures.
Conduct monthly phishing simulations with documented results. Review simulation data monthly to identify trends. Provide targeted re-training for staff with high click rates. Conduct annual advanced phishing awareness training covering new attack techniques. Monitor email security logs for indicators of phishing success. Review MFA deployment and conditional access policy effectiveness quarterly.
Email security filters phishing, but if phishing succeeds and credentials are harvested, attackers can access email without MFA. MFA is mandatory for email account security.
Staff complete annual phishing training but don't retain knowledge. Phishing simulation failure rates don't improve. Monthly phishing simulations with feedback are necessary to maintain awareness.
Staff suspect emails are phishing but have no easy way to report. Email security teams never learn about phishing attacks they could have prevented. User-friendly one-click reporting is essential.
Attackers compromise email accounts and set up forwarding rules to external addresses. Organisations don't detect the forwarding rule and attackers exfiltrate emails for months. Email forwarding rules must be monitored.
Phishing succeeds and credentials are compromised. Response is slow. Attackers use credentials for hours or days before account is disabled. Rapid password reset procedures (within 15 minutes of suspected compromise) are necessary.
Regulators increasingly view inadequate phishing controls as negligent security. Financial services regulators expect documented email security. Healthcare regulators expect staff training. Legal regulators expect client email protection. GDPR compliance requires appropriate security measures, which include email security.
Cyber insurance providers now require evidence of email security, MFA, and staff training before issuing policies. Organisations lacking these controls face insurance exclusions or very high premiums.
Phishing is now recognised as a board-level risk. Leadership should be reporting on: (1) email security tool effectiveness metrics, (2) phishing simulation results and trend analysis, (3) staff training completion rates, (4) number of phishing emails reported by users, (5) incidents involving phishing-compromised credentials and response times, and (6) MFA deployment and conditional access policy coverage.
Many organisations conduct annual email security assessments by external security consultants, providing board-level evidence of phishing protection maturity.
Phishing resilience is achievable. A well-resourced organisation can implement comprehensive phishing defences in 6-9 months: email security with anti-spoofing and real-time phishing detection, MFA on all email access, security awareness training, phishing simulations, and monitoring.
The investment is moderate: £25,000-£60,000 depending on organisation size and tool selection. The returns are substantial: reduced breach risk from phishing, faster incident response, and often simultaneous improvement in broader security posture. Email security and staff training are among the most cost-effective security investments available.
Phishing threats are persistent and evolving. Your organisation should be asking: Could staff identify a sophisticated phishing email? Can they report suspicious emails easily? Are compromised credentials detected quickly?
Monthly expert-curated updates empower you to protect your business with actionable cybersecurity insights, the latest threat data, and proven defences—trusted by UK IT leaders for reliability and clarity.
