{"id":5465,"date":"2015-06-23T17:05:04","date_gmt":"2015-06-23T17:05:04","guid":{"rendered":"http:\/\/www.backupassist.com\/blog\/?p=5465"},"modified":"2019-11-07T05:33:46","modified_gmt":"2019-11-07T05:33:46","slug":"spear-phishing-is-on-the-rise-know-how-to-spot-it","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it","title":{"rendered":"Spear phishing is on the rise &#8211; know how to spot it!"},"content":{"rendered":"<p>Spear Phishing has been on the rise lately, according to a number of\u00a0<a href=\"http:\/\/community.spiceworks.com\/topic\/1011409-very-targeted-phishing-attack\">recent posts by IT Professionals on Spiceworks<\/a>. These kinds of targeted attacks can be extremely harmful to businesses if staff aren&#8217;t properly prepared, so in this article, we&#8217;re going to look at what Spear Phishing is, how your business can defend against it, and the role your <a href=\"https:\/\/www.backupassist.com\/backupassist.html\" target=\"_blank\" rel=\"noopener noreferrer\">server backup software<\/a> will play in that defense.<br \/>\n<!--more--><\/p>\n<p>Let&#8217;s dive in.<\/p>\n<h2 style=\"text-align: left\">What is Phishing, and how is Spear Phishing different?<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5468\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/fisherman-797980_640.jpg\" alt=\"what is spear phishing?\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/fisherman-797980_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/fisherman-797980_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>Let&#8217;s start by defining Phishing. \u00a0Basically, it&#8217;s an attempt to trick people into divulging sensitive details (usernames, passwords, bank account info, credit card numbers, etc), or downloading a malicious software program, by masquerading as a trusted source. \u00a0Most Phishing attacks often come in the form of emails (although social media is another source to be wary of), and they will often be fairly easy to spot. \u00a0They&#8217;re usually sent in bulk by an attacker, to 1000&#8217;s of email addresses at a time in the hope that if you cast a broad enough net, you&#8217;ll catch a fish or two.<\/p>\n<p>Phishing attacks will generally pretend to be from a large organization, and might include the organization&#8217;s logo and correct mailing addresses (as these are easy to acquire online). \u00a0However, telltale signs of a Phishing attack will often be the use\u00a0of poor grammar and\/or spelling errors, links to non-official web URLs (although often these will attempt to look legitimate by changing just one letter in the real URL), and broad or generalized messaging in the content of the email. \u00a0For example:<\/p>\n<figure id=\"attachment_5474\" aria-describedby=\"caption-attachment-5474\" style=\"width: 539px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:PhishingTrustedBank.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-5474\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/PhishingTrustedBank.png\" alt=\"Phishing example from Wikipedia\" width=\"549\" height=\"408\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/PhishingTrustedBank.png 549w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/PhishingTrustedBank-300x223.png 300w\" sizes=\"auto, (max-width: 549px) 100vw, 549px\" \/><\/a><figcaption id=\"caption-attachment-5474\" class=\"wp-caption-text\">Image source: <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:PhishingTrustedBank.png\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia<\/a><\/figcaption><\/figure>\n<p>Fortunately, email providers and spam filters are getting better and better at recognizing and blocking these kinds of generic Phishing emails. \u00a0And as we mentioned, those that do slip through are often quite easily recognized as suspicious, even by untrained staff.<\/p>\n<p>Where things get more dangerous, is Spear Phishing.<\/p>\n<p>Spear Phishing is a very targeted form of Phishing attack, where attackers will target a specific company and even specific people within that company, rather than sending out bulk emails to every email address they can get their hands on. \u00a0This kind of attack is much more sinister, because the attacker will often tailor the email to the recipient. \u00a0Spear Phishing usually involves some form of\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\">social engineering<\/a>\u00a0on the part of the attacker, and will often appear to come from somebody high-ranking within the organization.<\/p>\n<p>In the\u00a0<a href=\"http:\/\/community.spiceworks.com\/topic\/1011409-very-targeted-phishing-attack\">Spiceworks topic<\/a>\u00a0we mentioned earlier, the email appeared to come from the CEO of the target company &#8211; using first and last name with a Gmail address.<\/p>\n<p>For obvious reasons, these kinds of attacks are much more difficult for non-educated staff to detect, and have a greater chance of being successful.<\/p>\n<h2 style=\"text-align: left\">So how can I prevent these attacks?<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5469\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/sweden-77216_640.jpg\" alt=\"preventing spear phishing attacks\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/sweden-77216_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/sweden-77216_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>Preventing Spear Phishing comes down to educating employees above anything else. \u00a0Social engineering attacks like Spear Phishing are designed to be convincing, and as such they can be difficult for uneducated coworkers to notice until it&#8217;s too late. \u00a0But they will almost certainly never be perfect, and if your employees\/colleagues are aware of the potential for these attacks, your business should be able to prevent the vast majority of attackers from getting what they want.<\/p>\n<p>The best and most effective step you can take towards thwarting potential Spear Phishing attacks is to simply make staff aware of them. \u00a0Show them examples of what Spear Phishing looks like, and caution them to be on the lookout for anything that seems even remotely out of the ordinary when it comes to email requests &#8211; even from seemingly legitimate sources.<\/p>\n<p>There are even a number of 3rd party companies who offer training programs in recognizing these kinds of attacks, and can perform &#8216;drills&#8217; where they send dummy Spear Phishing emails to your staff and track open and click rates to raise awareness in your business.<\/p>\n<p>Another technique can be to implement policies and procedures, wherein sensitive information or financial transactions cannot be disclosed or actioned except through specific channels, which have safeguards in place against attacks of this kind. \u00a0Of course, the type of business you run and any other number of variables will determine how viable this option is for you.<\/p>\n<p>Finally, you&#8217;ll want to make sure you have software in place that can reduce the damage these kinds of attacks can cause. \u00a0This can include\u00a0email filtering that can catch the emails before they hit staff&#8217;s inboxes, or anti-virus software that can stop malicious software from being installed if a coworker hits a malicious link. \u00a0And of course, your final line of defense is always going to be your backup solution!<\/p>\n<p>A watertight backup strategy is\u00a0what ensures that even if everything else fails, you can always recover safely.<\/p>\n<h2 style=\"text-align: left\">They&#8217;ve got me. What do I do now?<\/h2>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5470\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/chains-19176_640.jpg\" alt=\"what do do when spear phishing has worked\" width=\"450\" height=\"250\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/chains-19176_640.jpg 450w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2015\/06\/chains-19176_640-300x167.jpg 300w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p>Well, once you&#8217;ve been hit by a successful Spear Phishing attack, how you can best respond will depend on what the attackers were trying to achieve. \u00a0If they were after money directly, via a transfer or access to bank accounts for example, then once they&#8217;ve stolen what they came for unfortunately the matter is probably out of your hands. \u00a0Your bank and\/or the police are quite likely the only avenue here, other than recovering the system and changing log-in details to make sure the attacker cannot get back in. \u00a0Plus, as we mentioned above, you can make sure all staff are fully trained and educated on how to recognize and handle Spear Phishing attacks, to greatly reduce the likelihood of future incidents occurring.<\/p>\n<p>If, on the other hand, the aim of the attack was to install ransomware or some other form of malware onto your system, then provided you have good backups, cleaning up and reducing the potential for any serious damage is a much more straightforward process.<\/p>\n<p>In essence? Nuke the system from orbit and recover to bare-metal from a backup run before the attack took place.<\/p>\n<p>Much as with any ransomware and most forms of malware attacks, secure backups are your absolute best line of defense from serious damage. It&#8217;s what ensures that you can always recover to a point before the attack took place, and with minimal data compromised or lost.<\/p>\n<p>It&#8217;s just another reason why having\u00a0<a href=\"http:\/\/www.backupassist.com\/BackupAssist\/index.html\">reliable, recoverable backups<\/a>\u00a0is so important for all businesses of all shapes and sizes.<\/p>\n<p>Want to hear more about real world examples of Spear Phishing attacks? Check out these Spiceworks topics where IT Pros have described their experiences:<\/p>\n<p><a href=\"http:\/\/community.spiceworks.com\/topic\/1011409-very-targeted-phishing-attack\">Topic: Very Targeted Phishing Attack<\/a><\/p>\n<p><a href=\"http:\/\/community.spiceworks.com\/topic\/1005439-targetted-phishing-attack\">Topic: Targeted Phishing Attack<\/a><\/p>\n<p><a href=\"http:\/\/community.spiceworks.com\/topic\/995747-phishing-technique-with-same-similar-domain-name\">Topic: Phishing Technique with Similar Domain Name<\/a><\/p>\n<p><a href=\"http:\/\/community.spiceworks.com\/topic\/713414-phishing-attempt-38k-wire-transfer-almost-went-preventative-measures-to-take\">Topic: Phishing Attempt 38k Wire Transfer Almost Went Through<\/a><\/p>\n<p><a href=\"http:\/\/community.spiceworks.com\/topic\/637150-concerns-about-phishing-email\">Topic: Concerns about Phishing Email<\/a><\/p>\n<p style=\"text-align: center\"><em>Has your company been the target of Spear Phishing? Did backups save your bacon?<br \/>\n<\/em><em>Leave your story in the comments below, tweet it to us <a href=\"https:\/\/twitter.com\/BackupAssist\" target=\"_blank\" rel=\"noopener noreferrer\">@BackupAssist<\/a> or <a href=\"https:\/\/facebook.com\/BackupAssist\" target=\"_blank\" rel=\"noopener noreferrer\">post it to Facebook<\/a>.<br \/>\nShare this article to raise awareness and make life harder for attackers.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spear Phishing has been on the rise lately, according to a number of\u00a0recent posts by IT Professionals on Spiceworks. These kinds of targeted attacks can be extremely harmful to businesses if staff aren&#8217;t properly prepared, so in this article, we&#8217;re going to look at what Spear Phishing is, how your business can defend against it, &#8230; <a title=\"Spear phishing is on the rise &#8211; know how to spot it!\" class=\"read-more\" href=\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\">Read more <span class=\"screen-reader-text\">Spear phishing is on the rise &#8211; know how to spot it!<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":10332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,23,760],"tags":[317,388,389,390],"class_list":["post-5465","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interest","category-news","category-legacy","tag-backups","tag-malware","tag-security","tag-spear-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Spear phishing is on the rise - know how to spot it! | BA<\/title>\n<meta name=\"description\" content=\"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spear phishing is on the rise - know how to spot it!\" \/>\n<meta property=\"og:description\" content=\"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-23T17:05:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-07T05:33:46+00:00\" \/>\n<meta name=\"author\" content=\"Luke Parsons\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Spear phishing is on the rise - know how to spot it!\" \/>\n<meta name=\"twitter:description\" content=\"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?\" \/>\n<meta name=\"twitter:image\" content=\"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2015\/06\/fisherman-797980_640.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Parsons\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\"},\"author\":{\"name\":\"Luke Parsons\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297\"},\"headline\":\"Spear phishing is on the rise &#8211; know how to spot it!\",\"datePublished\":\"2015-06-23T17:05:04+00:00\",\"dateModified\":\"2019-11-07T05:33:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\"},\"wordCount\":1167,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png\",\"keywords\":[\"backups\",\"malware\",\"security\",\"spear phishing\"],\"articleSection\":[\"Interest\",\"News\",\"Z-Legacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\",\"url\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\",\"name\":\"Spear phishing is on the rise - know how to spot it! | BA\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png\",\"datePublished\":\"2015-06-23T17:05:04+00:00\",\"dateModified\":\"2019-11-07T05:33:46+00:00\",\"description\":\"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png\",\"width\":750,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spear phishing is on the rise &#8211; know how to spot it!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297\",\"name\":\"Luke Parsons\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g\",\"caption\":\"Luke Parsons\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/luke-parsons\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spear phishing is on the rise - know how to spot it! | BA","description":"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it","og_locale":"en_US","og_type":"article","og_title":"Spear phishing is on the rise - know how to spot it!","og_description":"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?","og_url":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it","og_site_name":"Cyber Resilience Blog","article_published_time":"2015-06-23T17:05:04+00:00","article_modified_time":"2019-11-07T05:33:46+00:00","author":"Luke Parsons","twitter_card":"summary_large_image","twitter_title":"Spear phishing is on the rise - know how to spot it!","twitter_description":"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?","twitter_image":"http:\/\/www.backupassist.com\/blog\/wp-content\/uploads\/2015\/06\/fisherman-797980_640.jpg","twitter_misc":{"Written by":"Luke Parsons","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it"},"author":{"name":"Luke Parsons","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297"},"headline":"Spear phishing is on the rise &#8211; know how to spot it!","datePublished":"2015-06-23T17:05:04+00:00","dateModified":"2019-11-07T05:33:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it"},"wordCount":1167,"commentCount":1,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png","keywords":["backups","malware","security","spear phishing"],"articleSection":["Interest","News","Z-Legacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it","url":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it","name":"Spear phishing is on the rise - know how to spot it! | BA","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png","datePublished":"2015-06-23T17:05:04+00:00","dateModified":"2019-11-07T05:33:46+00:00","description":"According to Spiceworks users, spear phishing attacks have been on the rise lately. Does your business know how to spot them? Can you recover if hit?","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2018\/02\/Spear-Phishing.png","width":750,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/spear-phishing-is-on-the-rise-know-how-to-spot-it#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"Spear phishing is on the rise &#8211; know how to spot it!"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/11c97915d32eff768b2f8739e7d37297","name":"Luke Parsons","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c6eec44e45e95d0501fd5b72357cc1d12b2b1208d93f8a4e0766c387aee0e2f?s=96&d=mm&r=g","caption":"Luke Parsons"},"url":"https:\/\/www.backupassist.com\/blog\/author\/luke-parsons"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=5465"}],"version-history":[{"count":1,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5465\/revisions"}],"predecessor-version":[{"id":13268,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/5465\/revisions\/13268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/10332"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=5465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=5465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=5465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}