{"id":33863,"date":"2025-10-20T10:07:01","date_gmt":"2025-10-20T10:07:01","guid":{"rendered":"https:\/\/1grid.co.za\/knowledge\/?post_type=ht_kb&#038;p=33863"},"modified":"2026-03-05T11:42:39","modified_gmt":"2026-03-05T11:42:39","slug":"what-is-phishing","status":"publish","type":"ht_kb","link":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/","title":{"rendered":"What Is Phishing? How It Works and How to Protect Yourself"},"content":{"rendered":"\n<p>Phishing remains one of the most common and deceptive online threats, a tactic that preys on trust and quick reactions.&nbsp;<\/p>\n\n\n\n<p>In this guide, we\u2019ll explain what phishing is, how these <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\"><strong>scams<\/strong> <\/a>work, and how to<strong> <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\">protect yourself and your business<\/a><\/strong> from falling victim.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"600\" src=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-61.png\" alt=\"\" class=\"wp-image-33868\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-ht-block-toc is-style-rounded htoc htoc--position-wide toc-list-style-plain\" data-htoc-state=\"expanded\"><span class=\"htoc__title\"><span class=\"ht_toc_title\">Table of Contents<\/span><span class=\"htoc__toggle\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\"><g fill=\"#444\"><path d=\"M15 7H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1z\"><\/path><path d=\"M15 1H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1zM15 13H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1z\"><\/path><\/g><\/svg><\/span><\/span><div class=\"htoc__itemswrap\"><ul class=\"ht_toc_list\"><li class=\"\"><a href=\"#htoc-\">What Is a Phishing Attack?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1\">Spoofing vs. Phishing: What\u2019s the Difference?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11\">How Is Phishing Carried Out?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-111\">How Are Phishing Emails Caught or Blocked?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111\">How Does Phishing Fit into Larger Attack Campaigns?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111\">What Is Spear Phishing?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-111111\">What Is Clone Phishing?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111111\">What Is Whaling?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111\">Phishing Across Multiple Channels&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-111111111\">How You Can Check If It&#8217;s Phishing through Email Spoofing&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111111111\">How to Protect Yourself from Phishing&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111111\">What to Do If You Become Suspicious&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-111111111111\">Helpful Tools to Detect or Report Phishing&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111111111111\">Best Practices and Ongoing Maintenance&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111111111\">FAQs&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111111111111111\">Additional Resources&nbsp;<\/a><\/li><\/ul><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-\"><strong>What Is a Phishing Attack?&nbsp;<\/strong><\/h2>\n\n\n\n<p>This is a form of <strong><a href=\"https:\/\/www.microsoft.com\/en-za\/security\/business\/security-101\/what-is-a-cyberattack#:~:text=A%20cyberattack%20is%20a%20deliberate,financial%20fraud%2C%20or%20system%20sabotage.\" target=\"_blank\" rel=\"noreferrer noopener\">cyberattack<\/a> <\/strong>where attackers disguise themselves as trustworthy sources to trick people into revealing personal or financial information in an attempt to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information, or other important data, in order to utilise or sell the stolen information.&nbsp;<\/p>\n\n\n\n<p>They usually pretend to be banks, service providers, or even familiar brands (like 1-grid) to get you to click a link, download an attachment, or share sensitive data.&nbsp;<\/p>\n\n\n\n<p><strong>Example:<\/strong> You receive an email that looks like it\u2019s from us saying your payment failed, but the link leads to a fake login page.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"600\" src=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-62.png\" alt=\"\" class=\"wp-image-33870\"\/><\/figure>\n<\/div>\n\n\n<p><strong>IMPORTANT: <\/strong>This can happen through email, SMS (smishing), voice calls (vishing), or even social media messages.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1\"><strong>Spoofing vs. Phishing: What\u2019s the Difference?&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-spoofing-is-the-act-of-forging-the-sender-s-identity\"><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Spoofing<\/strong><\/a> is the act of forging the sender&#8217;s identity.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-phishing-uses-deceptive-emails-often-spoofed-to-trick-you-into-revealing-sensitive-data-passwords-bank-details\"><strong>Phishing<\/strong> uses deceptive emails (often spoofed) to trick you into revealing sensitive data (passwords, bank details).&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>While all phishing emails may involve spoofing, not all spoofed emails are phishing, as some may just mimic identity without a direct scam.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11\"><strong>How Is Phishing Carried Out?&nbsp;<\/strong><\/h2>\n\n\n\n<p>hishing attacks rely on <a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-social-engineering\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>social engineering<\/strong><\/a>, which is a means of manipulating human emotion to bypass technical safeguards.&nbsp;<\/p>\n\n\n\n<p>&nbsp;<br>Attackers commonly:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-send-fake-emails-with-legitimate-looking-logos-and-addresses\">Send fake emails with legitimate-looking logos and addresses.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-use-urgent-messages-to-create-panic-your-account-will-be-closed-in-24-hours\">Use urgent messages to create panic (\u201cYour account will be closed in 24 hours!\u201d).&nbsp;<\/li>\n\n\n\n<li id=\"htoc-redirect-victims-to-lookalike-websites\">Redirect victims to lookalike websites.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-attach-malicious-files-disguised-as-invoices-or-receipts\">Attach malicious files disguised as invoices or receipts.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-finding-purchasing-or-scraping-known-contact-information\">Finding, purchasing, or <a href=\"https:\/\/en.wikipedia.org\/wiki\/Web_scraping\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>scraping<\/strong><\/a> known contact information.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-using-techniques-like-dns-fast-fluxing-to-disguise-their-hosting-servers\">Using techniques like <strong><a href=\"https:\/\/efficientip.com\/glossary\/what-is-dns-fast-flux\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNS fast fluxing<\/a> <\/strong>to disguise their hosting servers.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>At 1-grid, we do our best to<a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\"> <\/a><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\">safeguard<\/a> <\/strong>you from these attacks by encouraging you to make sure that you check that they are coming directly from us by <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-get-email-headers\/\"><strong>checking <\/strong><\/a>your<strong> <a href=\"https:\/\/1grid.co.za\/knowledge\/understanding-email-headers\/\">email headers<\/a><\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111\"><strong>How Are Phishing Emails Caught or Blocked?&nbsp;<\/strong><\/h2>\n\n\n\n<p>Receiving servers and email providers use authentication protocols and filters to flag or block spoofed emails sent as part of the attack.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-spf-sender-policy-framework-checks-if-the-sending-server-is-allowed-for-the-domain\"><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-an-spf-record-and-why-it-matters-in-dns-for-email\/\">SPF (Sender Policy Framework)<\/a>:<\/strong> Checks if the sending server is allowed for the domain.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-dkim-domainkeys-identified-mail-validates-cryptographic-signatures-on-outgoing-messages\"><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\">DKIM (DomainKeys Identified Mail)<\/a>:<\/strong> Validates cryptographic signatures on outgoing messages.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-dmarc-lets-domain-owners-instruct-how-recipients-handle-failed-spf-dkim-checks\"><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/cpanel-how-to-add-dmarc-record\/\">DMARC<\/a>:<\/strong> Allows domain owners to instruct how recipients handle failed SPF\/DKIM checks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Even with these, some spoofed emails may bypass protection, especially in cases like forwarding or advanced attacks.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111\"><strong>How Does Phishing Fit into Larger Attack Campaigns?<\/strong>&nbsp;<\/h2>\n\n\n\n<p>This is often the <strong>first step in a larger attack<\/strong>, used to gain login details or access-sensitive systems.&nbsp;<\/p>\n\n\n\n<p>&nbsp;Once attackers obtain credentials, they can:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-compromise-business-accounts\">Compromise business accounts.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-send-more-phishing-from-trusted-addresses\">Send more attacks from trusted addresses.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-deploy-ransomware-or-steal-payment-information\">Deploy ransomware or steal payment information.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>This creates a chain reaction, which is why <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>recognising and stopping it early<\/strong><\/a> is essential to protecting your digital identity.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111\"><strong>What Is Spear Phishing?<\/strong>&nbsp;<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/spear-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Spear phishing<\/a> <\/strong>targets specific individuals or organisations rather than the general public.&nbsp;<\/p>\n\n\n\n<p>Attackers research their targets, referencing real names, job titles, or company details to sound convincing.&nbsp;<\/p>\n\n\n\n<p>Example: A fake \u201cCEO email\u201d was sent to an employee requesting an urgent fund transfer.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111111\"><strong>What Is Clone Phishing?<\/strong>&nbsp;<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-clone-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Clone phishing<\/a> <\/strong>occurs when attackers <strong>duplicate a legitimate email<\/strong>. For example, they duplicate a genuine invoice and resend it with a <strong>malicious link or attachment<\/strong>.&nbsp;<\/p>\n\n\n\n<p>Because it looks identical to something you\u2019ve seen before, it\u2019s easier to fall for.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111111\"><strong>What Is Whaling?<\/strong>&nbsp;<\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-a-whaling-attack\" target=\"_blank\" rel=\"noreferrer noopener\">Whaling<\/a> <\/strong>is a type of spear phishing aimed at <strong>high-level executives or decision-makers<\/strong> (the \u201cbig fish\u201d).&nbsp;<\/p>\n\n\n\n<p>These attacks often involve impersonating legal or financial institutions to request sensitive business data or transfers.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111\"><strong>Phishing Across Multiple Channels<\/strong>&nbsp;<\/h2>\n\n\n\n<p>This doesn\u2019t only happen via email anymore.&nbsp;<\/p>\n\n\n\n<p>Attackers use:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-sms-smishing-text-messages-with-fake-delivery-or-payment-links\"><strong>SMS (<\/strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/what-is-smishing-and-how-to-defend-against-it\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Smishing<\/strong><\/a><strong>):<\/strong> Text messages with fake delivery or payment links.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-voice-calls-vishing-impersonating-banks-or-service-providers-over-the-phone\"><strong>Voice Calls (<\/strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/vishing\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Vishing<\/strong><\/a><strong>):<\/strong> Impersonating banks or service providers over the phone.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-social-media-fake-job-offers-or-account-recovery-scams\"><strong>Social Media:<\/strong> Fake job offers or account recovery scams.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>TIP: <\/strong>Always verify through an official website or support channel before acting on any message.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"514\" height=\"102\" src=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2022\/02\/Banner-from-1-grid-Spoofing-or-Phishing.png\" alt=\"\" class=\"wp-image-33722\"\/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111111111\"><strong>How You Can Check If It&#8217;s Phishing through Email Spoofing<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-view-full-email-headers-where-you-can-look-at-received-lines-return-path\">View full <a href=\"https:\/\/1grid.co.za\/knowledge\/understanding-email-headers\/\"><strong>email headers<\/strong><\/a> where you can look at <em>Received<\/em> lines, Return-Path.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-compare-the-from-domain-to-what-s-authenticated-by-spf-dkim\">Compare the \u201cFrom\u201d domain to what&#8217;s authenticated by SPF\/DKIM.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-hover-over-links-to-check-if-they-point-to-the-correct-domain\">Hover over links to check if they point to the correct domain.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-be-cautious-if-the-email-has-urgent-requests-unfamiliar-links-or-mismatched-details\">Be cautious if the email has urgent requests, unfamiliar links, or mismatched details.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111111111\"><strong>How to Protect Yourself from Phishing&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-check-the-sender-s-domain-via-their-email-headers-legitimate-emails-come-from-verified-addresses\">Check the sender\u2019s domain via their email headers (legitimate emails come from verified addresses).&nbsp;<\/li>\n\n\n\n<li id=\"htoc-hover-over-links-before-clicking-and-make-sure-they-match-the-real-website\">Hover over links before clicking and make sure they match the real website.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-look-for-grammar-or-formatting-mistakes-common-red-flags\">Look for grammar or formatting mistakes (<a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>common red flags<\/strong><\/a>).&nbsp;<\/li>\n\n\n\n<li id=\"htoc-never-share-passwords-or-otps-over-email-or-sms\">Never share passwords or OTPs over email or SMS.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-keep-your-software-browsers-and-antivirus-updated\">Keep your software, browsers, and antivirus updated.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-enable-spf-dkim-and-dmarc-to-protect-your-own-domain\">Enable<strong> <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\" target=\"_blank\" rel=\"noreferrer noopener\">SPF<\/a><\/strong>, <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>DKIM<\/strong><\/a>, and<strong> <a href=\"https:\/\/1grid.co.za\/knowledge\/cpanel-how-to-add-dmarc-record\/\" target=\"_blank\" rel=\"noreferrer noopener\">DMARC<\/a><\/strong> to protect your own domain.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111\"><strong>What to Do If You Become Suspicious<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-don-t-click-any-links-or-download-attachments\">Don\u2019t click any links or download attachments.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-forward-the-email-to-1-grid-support-for-analysis\">Forward the email to 1-grid Support for analysis.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-block-the-sender-or-mark-as-spam\">Block the sender or mark as spam.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-if-it-appears-from-a-trusted-contact-verify-via-alternative-means-call-sms\">If it appears from a trusted contact, verify via alternative means (call, SMS).&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111111111111\"><strong>Helpful Tools to Detect or Report Phishing<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-dnschecker-email-header-analyzer\"><strong><a href=\"https:\/\/dnschecker.org\/email-header-analyzer.php\" target=\"_blank\" rel=\"noreferrer noopener\">DNSChecker Email Header Analyser<\/a>&nbsp;<\/strong><\/li>\n\n\n\n<li id=\"htoc-mxtoolbox-email-header-analyzer\"><strong><a href=\"https:\/\/mxtoolbox.com\/EmailHeaders.aspx\" target=\"_blank\" rel=\"noreferrer noopener\">MxToolbox Email Header Analyser<\/a>&nbsp;<\/strong><\/li>\n\n\n\n<li id=\"htoc-sendmarc-email-header-analysis-tool\"><strong><a href=\"https:\/\/tools.sendmarc.com\/header-analysis\" target=\"_blank\" rel=\"noreferrer noopener\">Sendmarc Email Header Analysis Tool<\/a>&nbsp;<\/strong><\/li>\n\n\n\n<li id=\"htoc-google-message-header-tool\"><strong><a href=\"https:\/\/toolbox.googleapps.com\/apps\/messageheader\/\" target=\"_blank\" rel=\"noreferrer noopener\">Google Message Header Tool<\/a>&nbsp;<\/strong><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111111111111\"><strong>Best Practices and Ongoing Maintenance<\/strong>&nbsp;<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-rotate-dkim-keys-periodically\">Rotate DKIM keys periodically&nbsp;<\/li>\n\n\n\n<li id=\"htoc-tighten-spf-to-include-only-necessary-sending-servers\">Tighten SPF to include only the necessary sending servers&nbsp;<\/li>\n\n\n\n<li id=\"htoc-update-and-clean-dns-records-periodically\">Update and clean <strong><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-a-domain-name-server-dns\/\" target=\"_blank\" rel=\"noreferrer noopener\">DNS<\/a> <\/strong>records periodically&nbsp;<\/li>\n\n\n\n<li id=\"htoc-educate-your-team-and-end-users-on-spotting-spoofing-attempts\">Educate your team and end-users on <strong><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">spotting spoofing attempts<\/a>&nbsp;<\/strong><\/li>\n\n\n\n<li id=\"htoc-use-monitoring-tools-or-alerts-on-dmarc-reports\">Use monitoring tools or alerts on DMARC reports&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111\"><strong>FAQs&nbsp;<\/strong><\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What should I do if I clicked on a phishing link?<\/strong><\/summary>\n<p id=\"htoc-111111111111111\">Disconnect from the internet, change your passwords immediately, and scan your device for malware, then report it to your IT Support or ISP.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Can phishing happen through social media?<\/strong><\/summary>\n<p id=\"htoc-1111111111111111\">Yes. Attackers use fake profiles, links, and messages to steal credentials or install malware.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>How can I protect my business from phishing?<\/strong><\/summary>\n<p id=\"htoc-11111111111111111\">Use domain authentication (SPF, DKIM, DMARC), train employees, and secure all logins with multi-factor authentication.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Who can I contact if I receive a phishing email pretending to be from 1-grid?<\/strong><\/summary>\n<p id=\"htoc-111111111111111111\">Forward it to <a href=\"mailto:support@1-grid.com\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>support@1-grid.com<\/strong><\/a> so that our team can investigate and guide you on the next steps.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Can I stop spoofers from using my domain completely?&nbsp;<\/strong><\/summary>\n<p id=\"htoc-1111111111111111111\">Unfortunately, spoofers can try to forge any domain. But by publishing correct SPF, DKIM, and DMARC records, you can ensure recipient mail servers reject or quarantine fraudulent messages.<\/p>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111111111\"><strong>Additional Resources&nbsp;<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>How Do I Prevent Email Spoofing Attacks?<\/strong><\/a><strong>\u00a0<\/strong>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>How to Spot a Scam Email<\/strong><\/a><strong>\u00a0<\/strong>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=email+headers&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Email Headers FAQs<\/strong><\/a>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>How to Enable DKIM and SPF on Your Mail Domain<\/strong><\/a><strong>\u00a0<\/strong>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/why-ssl-the-purpose-of-using-ssl-certificates\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Why SSL? The Purpose of Using SSL Certificates<\/strong><\/a>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/settings-to-configure-your-1grid-email-accounts-across-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Settings to Configure Your 1-grid Email Accounts Across Devices<\/strong><\/a>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-a-domain-name-server-dns\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>What is a Domain Name Server (DNS)?<\/strong><\/a>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=mailchannels&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>MailChannels FAQs<\/strong><\/a>\u00a0<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=spamtitan&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>SpamTitan FAQs<\/strong><\/a>\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111111111111111111111\"><strong>Need Additional Support?&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong>We&#8217;re Here to <\/strong><a href=\"https:\/\/1grid.co.za\/knowledge\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Help<\/strong><\/a><strong>:<\/strong>&nbsp;<\/p>\n\n\n\n<p>Protecting yourself, your business, emails, and domain against phishing and spoofing doesn\u2019t have to cause you to worry with this easy-to-reference guide. Stuck? Contact our Support Team for guidance (<a href=\"https:\/\/1grid.co.za\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>https:\/\/1grid.co.za\/contact-us\/<\/strong><\/a>). We&#8217;re ready to see how we can help!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing remains one of the most common and deceptive online threats, a tactic that preys on trust and quick reactions.&nbsp; In this guide, we\u2019ll explain what phishing is, how these scams work, and how to protect yourself and your business from falling victim.&nbsp; What Is a Phishing Attack?&nbsp; This is&#8230;<\/p>\n","protected":false},"author":21,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"ht-kb-category":[1173,1174,1190],"ht-kb-tag":[121,1341,305,306,1527,1528,1477,877,942,945],"class_list":["post-33863","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-email","ht_kb_category-hosting","ht_kb_category-web-security","ht_kb_tag-awareness","ht_kb_tag-cybersecurity","ht_kb_tag-dkim","ht_kb_tag-dmarc","ht_kb_tag-email-safety","ht_kb_tag-online-protection","ht_kb_tag-phishing","ht_kb_tag-scam","ht_kb_tag-spf","ht_kb_tag-spoofing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base<\/title>\n<meta name=\"description\" content=\"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base\" \/>\n<meta property=\"og:description\" content=\"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"1-grid Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/1grid.co.za\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T11:42:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-61.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\",\"name\":\"What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base\",\"isPartOf\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\"},\"datePublished\":\"2025-10-20T10:07:01+00:00\",\"dateModified\":\"2026-03-05T11:42:39+00:00\",\"description\":\"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.\",\"breadcrumb\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/1grid.co.za\/knowledge\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Phishing? How It Works and How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"contentUrl\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"width\":100,\"height\":100,\"caption\":\"1-Grid Domain Hosting Knowledge Base\"},\"image\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/1grid.co.za\/\",\"https:\/\/twitter.com\/1grid_hosting\",\"https:\/\/www.instagram.com\/1grid_hosting\/\",\"https:\/\/za.linkedin.com\/company\/1-grid\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base","description":"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base","og_description":"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.","og_url":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/","og_site_name":"1-grid Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/1grid.co.za\/","article_modified_time":"2026-03-05T11:42:39+00:00","og_image":[{"url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-61.png"}],"twitter_card":"summary_large_image","twitter_site":"@1grid_hosting","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/","url":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/","name":"What Is Phishing? How It Works and How to Protect Yourself - 1-grid Knowledge Base","isPartOf":{"@id":"https:\/\/1grid.co.za\/knowledge\/#website"},"datePublished":"2025-10-20T10:07:01+00:00","dateModified":"2026-03-05T11:42:39+00:00","description":"Understand phishing, its different forms, and how to protect yourself. Stay safe with 1-grid\u2019s easy guide to identifying phishing scams.","breadcrumb":{"@id":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/1grid.co.za\/knowledge\/"},{"@type":"ListItem","position":2,"name":"What Is Phishing? How It Works and How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/1grid.co.za\/knowledge\/#website","url":"https:\/\/1grid.co.za\/knowledge\/","name":"1-Grid Domain Hosting Knowledge Base","description":"","publisher":{"@id":"https:\/\/1grid.co.za\/knowledge\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/1grid.co.za\/knowledge\/#organization","name":"1-Grid Domain Hosting Knowledge Base","url":"https:\/\/1grid.co.za\/knowledge\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/","url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","contentUrl":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","width":100,"height":100,"caption":"1-Grid Domain Hosting Knowledge Base"},"image":{"@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/1grid.co.za\/","https:\/\/twitter.com\/1grid_hosting","https:\/\/www.instagram.com\/1grid_hosting\/","https:\/\/za.linkedin.com\/company\/1-grid"]}]}},"_links":{"self":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/33863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/comments?post=33863"}],"version-history":[{"count":3,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/33863\/revisions"}],"predecessor-version":[{"id":34460,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/33863\/revisions\/34460"}],"wp:attachment":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/media?parent=33863"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-category?post=33863"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-tag?post=33863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}