• Contact Us

    We will get back to you as soon as possible.

  • We do not collect personal information except to the extent you provide that information to use through email, your web browser or through our contact forms. We will not share, sell or otherwise provide non-public information to others without your consent.

SIGN UP FOR OUR NEWSLETTER

  • We do not collect personal information except to the extent you provide that information to use through email, your web browser or through our contact forms. We will not share, sell or otherwise provide non-public information to others without your consent.

Technical Tip – Phishing Email Attack
Published on October 19, 2020
Phishing Email Attacks

Email Phishing is but one type of email attack individuals and organizations can inadvertently fall prey to. Take a moment to arm yourself, family and employees with some knowledge.  Ensure likewise to proactively verify the appropriate educational and security deterrents are in place.  Help yourself and others avoid falling prey to such senseless and debilitating attacks. (KnowBe4)

Office 365 Advanced Threat Protection Plan 1 or 2 can help provide the necessary business protection for anti-phishing, anti-spam and anti-malware.  Contact DTS to sign up for your free trial today.

We at DTS Inc. proactively help our customers to reduce their overall IT business costs, while simultaneously assist to raise technical and security standards. Reduction of IT costs paired against increase of standards can, and is often, perceived to be in conflict. We have found these two factually run parallel with one another. Schedule an appointment to find out how these can be achieved.


Phishing is an email attack that tries to steal sensitive information in messages that appear to be from legitimate or trusted senders. There are specific categories of phishing. For example:

    • Spear phishing uses focused, customized content that’s specifically tailored to the targeted recipients (typically, after reconnaissance on the recipients by the attacker).
    • Whaling is directed at executives or other high value targets within an organization for maximum effect.
    • Business email compromise (BEC) uses forged trusted senders (financial officers, customers, trusted partners, etc.) to trick recipients into approving payments, transferring funds, or revealing customer data.
    • Ransomware that encrypts your data and demands payment to decrypt it almost always starts out in phishing messages. Anti-phishing protection can’t help you decrypt encrypted files, but it can help detect the initial phishing messages that are associated with the ransomware campaign. For more information about recovering from a ransomware attack, see Recover from a ransomware attack in Microsoft 365.

With the growing complexity of attacks, it’s even difficult for trained users to identify sophisticated phishing messages. Fortunately, Exchange Online Protection (EOP) and the additional features in Office 365 Advanced Threat Protection (Office 365 ATP) can help.  (ref: Microsoft Link)