How to Protect Against Phishing Attacks | Pros & Cons of Anti-Phishing Methods

Secfense meta 2a

How to Protect Against Phishing

Phishing is bad. Really bad. There’s probably no other web phenomenon that has so many worrying statistics.

  • 60% of small companies that suffer a cyber attack are out of business within 6 months.
  • In 2018 cybercrime generated more than $1.5 trillion of profit.
  • More than 80% of security breaches come from phishing and credential theft.
  • There are 1.9 billion stolen passwords and usernames available on the black market, and up to 25% of them still work on Google accounts.

Yet people are still pretty careless about the thing.

We all got in the past emails from a Nigerian prince trying to share his wealth with us, didn’t we?

‘There’s no way I’m not falling for this!’ you may say.

‘Who can get fooled with that anyway?’

Well, for the Nigerian prince scam hopefully no one anymore.

But what about banking scams, healthcare attacks, e-commerce breaches?

There is no single week without news informing about new successful phishing attack.

Millions of dollars are lost and thousands of valuable data are compromised.

So how can companies protect against phishing?

Phishing Filters

Most of the phishing attacks come from emails.

  1. You get an email that looks legitimate.
  2. You follow the instructions in that email.
  3. Your data or credentials get stolen.

Email content filtering focuses on the content of a message you receive. The software analyzes things like From, Subject, Date, To, etc., and determines if the email is legitimate or not.

Messages that look suspicious are marked as spam and stored in a separate folder or removed.

This service is offered practically by all software security vendors. This includes companies like Kaspersky Internet Security, Spam Assassin or GoldPhish.

You can set up a phishing filter for privacy protection on your own in Chrome, Firefox, Outlook, and all other popular email agents. You can also check with your IT Security team at work and make sure that you’re using the best available phishing protection offered by your company. Business email solutions usually feature standard security functions.

Phishing Filters Pros:

Phishing Filters are Fast & Easy

Easy to implement and relatively inexpensive. Security software can be installed in just a few minutes.

First Line of Defence

Phishing filters are the first tool to reach out for and offer a lot of useful features: whitelisting, blacklisting, file blocking, and customizable rules.

Phishing Filters Cons:

Human Factor Necessary

The software does recognize all suspicious emails and needs to be trained. A base of suspicious senders should be frequently updated. Because of that, the human factor is still necessary and a person needs to decide if a new website should be blocked or not.

Bayesian Poisoning

Content filtering protection can be compromised by spammers who know how to effectively decrease the effectiveness of spam filters. Bayesian filtering intents to determine if an incoming mail is a spam or not. Adding words that usually don’t appear in spam messages can effectively cause spam filters to believe the message is legitimate.

There’s a great article here discussing in detail how reliable are email filters. The brief version:

‘It is fair to say that spam filters don’t provide all of the protection from targeted malicious emails that users need’.

I really recommend reading this article and going through more detailed takeaways. The author performed a test on the most popular brands like Gmail, Outlook, Yahoo, AOL and Apple mail.

Phishing Awareness Training

These kinds of training are usually held in a longer timeframe. They are conducted by a hired organization that acts as an attacker and tries to compromise employees.

So-called white hat hackers perform staged phishing attack to see how many people will fall for this. Later the data is analyzed and depending on results appropriate steps are taken usually in a form of some additional training and monitoring.

There’s a number of organizations that offer phishing awareness trainings with companies like Cofense, Wombat or Barracuda to name a few.

If you want to learn more about this and find out the best companies that can help you with that you can type in Google phishing as a Service (PHaaS) and list some companies, reach out to them, and then compare their offer.

Awareness Training Pros:

Building awareness of your workforce

Properly applied education in a long-term can cause great effects and lead to the situation where employees turn into security ambassadors and an effective anti-phishing filter a company.

Awareness Training Cons:

‘Untrainable’ employees

In every organization, there are always some people that are somehow immune to trainings. According to Wombat Security, the healthcare industry employees repetitively score low on security awareness trainings answering 23% of data security best practice questions incorrectly every time.

Employee retention

Companies with high employee fluctuation and multiple applications in use are almost always vulnerable to human errors. In corporations that hire thousands of employees, it’s impossible to keep employees’ security awareness on the same level when there are new employees hired every month.

Far from sight

According to effectiveness of security trainings depend on location. While employees working in the HQ were more likely to comply with company security policies those working in remote locations were usually much more careless and didn’t pay much attention to security best practices.

2FA /MFA Technology

No matter how many security measures you will introduce your organization may get compromised anyway. That’s why technology still needs to be introduced into the process.

Chances are, you’ve heard of or even used two-factor authentication before. This security method requires each user to provide a password and an additional piece of information he or she owns to verify the login credentials.

There are many different setups that can be used with two-factor authentication, with FIDO Universal 2nd Factor Authentication being the most secure of them all. Also known as U2F, this setup requires users to provide a physical USB key as well as their password to gain access to the information they need.

2FA Pros:

Battle-tested 2FA

U2F technology is so efficient that none of Google’s 85,000 employees have been phished successfully since the company adopted U2F back in early 2017. U2F is on its way to becoming the next golden security standard in the global business world because it even protects users against themselves.

Hard(ware) protection

You may not be aware of it but you use two-factor authentication already. When you take money from your ATM you use your card (login) and your pin code (second factor). So when you lose your debit card you don’t have to worry cause it’s still protected with a second factor that the thief most likely doesn’t know.

2FA Cons:

Not all 2FA methods are 100% phishing proof

At the moment of writing this article, the only method of protection that has not yet been compromised is U2F protection where you need a physical security key. Other 2FA methods offer an incomparably higher level of protection than only a password however you need to be aware that SMS as a second factor has been compromised before.


In cybersecurity, there’s always a struggle between making a solution safer or more convenient. Since U2F is a method that has not yet been compromised it still requires a physical object that a person needs to have when intending to log in. Losing a security key, contrary to popular belief is not a problem. You can register a couple of keys and if you lose one you can use another. But that being said is still one extra object to carry with you all the time.

What’s the best anti-phishing protection?

A mix of all the above-mentioned elements.

You can have a trained team, but one employee that gets tricked can jeopardize the whole company.

You can have the most advanced philters but more advanced hackers can always go around.

The physical security key U2F would need to get physically stolen from your employee’s pocket to be used by a third party but that’s also a scenario that you should consider.

Below this article, I will share some links to the companies offering anti-phishing protection in each of the above-mentioned ways. It’s up to you to decide which approach is the best for your organization at the current stage.

Once again, if you have some comments or would like to help to make this article better please let me know in the comments or add me on Linkedin.

Good luck!

Antoni takes care of all the marketing content that comes from Secfense. Read More


We are faced with new challenges every day. We must always be one step ahead of the attackers and know what they are going to do before they do it. We are convinced that the User Access Security Broker will bring security to a new level, both for those working at the office and from home. For us, working with Secfense is an opportunity to exchange experience with developers who put great value on out-of-the-box thinking.

Krzysztof Słotwiński

Business Continuity and Computer Security Officer

BNP Paribas Bank Poland

As part of the pre-implementation analysis, we verified that users utilize a wide range of client platforms: desktop computers, laptops, tablets, smartphones, and traditional mobile phones. Each of these devices differs in technological advancement, features, and level of security. Because of this, and also due to the recommendation of the Polish Financial Supervision Authority (UKNF), we decided to introduce additional protection in the form of multi-factor authentication mechanisms based on FIDO. As a result, users of our applications can log in safely, avoiding common cyber threats such as phishing, account takeover, and theft of their own and their clients’ data.

Marcin Bobruk



We are excited to partner with Secfense to enhance our user access security for our web apps. By integrating their User Access Security Broker, we ensure seamless and secure protection for our applications and systems, delivering superior security and convenience to our customers.

Charm Abeywardana

IT & Infrastructure

Visium Networks

Before investing in Secfense, we had the opportunity to talk to its existing clients. Their reactions were unanimous: wow, it’s so easy to use. We were particularly impressed by the fact that implementing their solution does not require the involvement of IT developers. It gives Secfense a huge advantage over the competition, and at the same time opens the door to potential customers who so far were afraid of changes related to the implementation of multi-factor authentication solutions.

Mateusz Bodio

Managing Director


Even when the network and infrastructure are secured enough, social engineering and passwords can be used to gain control of the system by attackers. Multifactor authentication is the current trend. Secfense addresses this and allows you to build zero trust security and upgrade your current systems to passwordless applications within minutes, solving this problem right away,” said Eduard Kučera, Partner at Presto Ventures and cybersecurity expert – former Director in hugely successful Czech multinational cyber security firm Avast.

Eduard Kučera


Presto Ventures

One of the biggest challenges the world is facing today is securing our identity online. That’s why we were so keen to have Secfense in our portfolio. They make it possible to introduce strong authentication in an automated way. Until now, organizations had to selectively protect applications because the deployment of new technology was very hard, or even impossible. With Secfense, the implementation of multi-factor authentication is no longer a problem, and all organizations can use the highest standards of authentication security.

Stanislav Ivanov

Founding Partner

Tera Ventures

Two-factor authentication is known to be one of the best ways to protect against phishing; however, its implementation has always been difficult. Secfense helped us solve that problem. With their security broker, we were able to introduce various 2FA methods on our web applications at once.

Dariusz Pitala

Head of IT