{"id":27467,"date":"2026-02-20T08:49:01","date_gmt":"2026-02-20T08:49:01","guid":{"rendered":"https:\/\/www.policybee.co.uk\/blog\/?p=27467"},"modified":"2026-04-28T14:02:53","modified_gmt":"2026-04-28T13:02:53","slug":"how-to-protect-your-small-business-from-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks","title":{"rendered":"How to protect your small business from phishing attacks"},"content":{"rendered":"\n<p><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"300\" src=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg\" alt=\"Being critical and asking the right questions can help you protect your small business from phishing attacks\" class=\"wp-image-27466\" style=\"object-fit:cover;width:300px;height:150px\" srcset=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg 600w, https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit-300x150.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p>Phishing is the number one gateway to cybercrime. It\u2019s thought that <a href=\"https:\/\/enfortra.com\/up-to-95-of-cyberattacks-begin-with-phishing\/\" type=\"link\" id=\"https:\/\/enfortra.com\/up-to-95-of-cyberattacks-begin-with-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">up to 95% of cyber-attacks and data breaches<\/a> start with a phishing attack. And that <a href=\"https:\/\/www.huntress.com\/phishing-guide\/phishing-attack-statistics\" type=\"link\" id=\"https:\/\/www.huntress.com\/phishing-guide\/phishing-attack-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">three quarters of phishing attacks<\/a> begin with a deceptive email.<\/p>\n\n\n\n<p>Cybercriminals use them because they\u2019re effective, easy to deploy, and allow them to profit by <a href=\"https:\/\/www.policybee.co.uk\/blog\/average-cost-of-data-breach-for-small-business\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/blog\/average-cost-of-data-breach-for-small-business\" target=\"_blank\" rel=\"noreferrer noopener\">exploiting the personal data<\/a> of all kinds of businesses.<\/p>\n\n\n\n<p>Here, we\u2019ll tell you everything you need to know about how to protect your business from phishing attacks: what they are, how they work, and how to spot them. So, you can feel confident sending any sneaky attempts to steal your data straight to \u2018spam\u2019.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are phishing attacks?<\/h2>\n\n\n\n<p>By \u2018phishing attacks\u2019, we mean the many devious techniques cybercriminals can use to trick you into revealing private info like passwords and bank details. For example, by using fraudulent emails, websites, social media posts, text messages, or even voicemail messages.<\/p>\n\n\n\n<p>Phishing is a form of <a href=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/blog\/a-guide-to-social-engineering-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">social engineering<\/a>. Which is where cybercriminals use strong psychological triggers \u2013 like trust, urgency, or fear \u2013 to manipulate people into doing something for them.<\/p>\n\n\n\n<p>It\u2019s used to target both individuals and businesses with startling efficacy: <a href=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" type=\"link\" id=\"https:\/\/www.gov.uk\/government\/statistics\/cyber-security-breaches-survey-2025\/cyber-security-breaches-survey-2025\" target=\"_blank\" rel=\"noreferrer noopener\">over 85% of UK businesses<\/a> identified having had a phishing attack in 2025.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What do phishing attacks look like?<\/h2>\n\n\n\n<p>There are lots of different types. However, some classic examples include those dodgy-looking emails from \u2018your bank\u2019 or \u2018HMRC\u2019 asking you to log into your account and update your personal details. Or claiming you\u2019ve won a competition and need to give a few basic details to claim your prize&#8230;<\/p>\n\n\n\n<p>We\u2019ve all laughed at those fake emails from Nigerian princes urging you to transfer large amounts of money, promising a lavish reward in return. <\/p>\n\n\n\n<p>Now, hackers have wised up to the fact that they\u2019re more likely to catch you out by pretending to be someone associated with your business \u2013 like a parcel shipment company or someone on your team.<\/p>\n\n\n\n<p>What\u2019s more, today\u2019s rapid-fire technological advances mean phishing attempts look and feel more convincing. And while the psychological element hasn\u2019t changed any, hackers can use generative AI to help them.<\/p>\n\n\n\n<p>Like a fake social media post encouraging you to click on a fraudulent link. Or a voice note from a \u2018colleague\u2019 asking you to pay a late invoice for them. Hackers can even create QR codes that release a torrent of malevolent code when scanned by your phone.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why are small businesses vulnerable to phishing attacks?<\/h2>\n\n\n\n<p>Cybercriminals bank on the fact that because you\u2019re a small business, your cyber defences will be weaker. And then there are creepy techniques like <a href=\"https:\/\/www.policybee.co.uk\/blog\/cyber-security-definitions-what-means-what\" target=\"_blank\" rel=\"noreferrer noopener\">spear phishing<\/a>, where hackers gather information about you to help them create a targeted attack.<\/p>\n\n\n\n<p>If you\u2019re a small business that\u2019s had its systems hacked and its website shut down, you might indeed not have the time, money, or resources to deal with it as swiftly and efficiently as a larger company.<\/p>\n\n\n\n<p>However, the truth is that most cybercriminals don\u2019t discriminate. They can send out masses of fraudulent emails to all kinds of businesses with just one click. Then sit back and wait to see who bites.<\/p>\n\n\n\n<p>Seeing how even the most vigilant small businesses can be caught out, that might just be someone who doesn\u2019t have the time or expertise necessary to vet each and every \u2018urgent\u2019 email they receive. Like you.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">6 ways to spot phishing emails<\/h2>\n\n\n\n<p>With that in mind, here are our top tips for how to protect your business from phishing attacks by spotting them as soon as possible. They should help you identify some major red flags when you&#8217;re scanning your inbox:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Is it urgent?<\/strong> If an unsolicited email asks that you do something NOW, it might well be a phishing email. Tell-tale phrases include, \u2018immediate action required\u2019, \u2018account suspension warning\u2019 etc.<\/li>\n\n\n\n<li><strong>Is it asking for your private info?<\/strong> Stay well clear of any communications that do. Real companies won\u2019t ever ask you to send any information that would allow them to identify you personally via email. (It\u2019s illegal for them to do so, in fact.)<\/li>\n\n\n\n<li><strong>Be critical.<\/strong> Ask yourself: Who\u2019s the sender? Are they addressing me personally or in a generic way? What are they asking me to do? Was I expecting to hear from them? Can I verify the sender personally? Are they offering something that\u2019s too good to be true?<\/li>\n\n\n\n<li><strong>Scan for errors.<\/strong> Tell-tale indicators you might be looking at a phishing email include subtle changes in domain names, dodgy logos, strange formatting, awkward phrasing, or spelling and grammar mistakes in the subject line or body text.<\/li>\n\n\n\n<li><strong>Verify all links and attachments.<\/strong> Never open up any links or PDFs, Word docs, Excel files, etc. without first checking the file name\/URL by hovering over it with your mouse. Treat any file names with extensions such as .zip, .exe or .scr with caution.<\/li>\n\n\n\n<li><strong>Trust your instincts.<\/strong> If something doesn\u2019t feel or look right, it\u2019s worth asking for a second opinion. <\/li>\n<\/ol>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How do phishing attacks work?<\/h2>\n\n\n\n<p>Assuming cybercriminals do get you to click on a dodgy link or open up a corrupt email attachment. What then?<\/p>\n\n\n\n<p>Some phishing attacks work by infecting your servers with <a href=\"https:\/\/www.policybee.co.uk\/blog\/ransomware-insurance-a-simple-guide\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/blog\/ransomware-insurance-a-simple-guide\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware<\/a> to extort you for money. Others sneakily install spyware on your computer to harvest your credentials which they can sell on to other criminals.<\/p>\n\n\n\n<p>If that happens, it\u2019s not just your business\u2019s data that\u2019s at risk\u2026your clients\u2019 data is fair game too, unfortunately. Which is another reason to know what you can do to protect your small business from different kinds of phishing attacks. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to protect your small business from phishing attacks<\/h2>\n\n\n\n<p>When it comes to protecting your small business from financial crimes like phishing, knowing how to spot a phishing attack should always be your first line of defence.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.gov.uk\/report-suspicious-emails-websites-phishing\" type=\"link\" id=\"https:\/\/www.gov.uk\/report-suspicious-emails-websites-phishing\" target=\"_blank\" rel=\"noreferrer noopener\">Reporting phishing attempts<\/a> to the <a href=\"https:\/\/www.ncsc.gov.uk\/\" type=\"link\" id=\"https:\/\/www.ncsc.gov.uk\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Cyber Security Centre (NCSC)<\/a> means attacks can be stopped at source. The NCSC also <a href=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" type=\"link\" id=\"https:\/\/www.ncsc.gov.uk\/collection\/phishing-scams\" target=\"_blank\" rel=\"noreferrer noopener\">have a bunch of resources<\/a> to help you spot scam emails, texts, websites, and calls.<\/p>\n\n\n\n<p>Staying on top of the latest techniques for phishing attacks by using an online training programme like <a href=\"https:\/\/www.cybsafe.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">CybSafe<\/a> will certainly help you protect your business too. They\u2019ll send out regular reminders to refresh your training and keep your cybersecurity skills sharpened.<\/p>\n\n\n\n<p>However, as modern phishing attacks increasingly use AI and sophisticated impersonation techniques, relying on basic spam filters to protect yourself isn&#8217;t enough.<\/p>\n\n\n\n<p>You should also have <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/multifactor-authentication-MFA\" type=\"link\" id=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/multifactor-authentication-MFA\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a> for all of your online accounts and use a password manager to generate strong passwords. And, crucially, keep your security systems and software updated. This allows you to close up vulnerabilities quickly and stop sneaky phishing attacks slipping through your cybersecurity defences.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How cyber insurance protects small businesses<\/h2>\n\n\n\n<p>While <a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance<\/a> won&#8217;t stop you from falling victim to a phishing attack, it does provide the technical support needed to shut down cyber-attacks and data breaches quickly. As well as hiring a team of experts to help you deal with the fallout of potentially losing you and your clients&#8217; data to cybercriminals.<\/p>\n\n\n\n<p>Specifically, cyber insurance:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Pays the legal costs and compensation associated with most data breaches<\/li>\n\n\n\n<li>Hires a PR expert to help you manage your reputation<\/li>\n\n\n\n<li>Provides technical expertise to help you recover.<\/li>\n<\/ul>\n\n\n\n<p>Ultimately, the sooner you act after any phishing attacks, the better you\u2019ll be able to protect your business and off-set any serious damage to your systems. Cyber insurance, with financial cybercrime cover added on to protect against social engineering attacks, will do just that.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Defences up<\/h2>\n\n\n\n<p>If you\u2019d like more info about <a href=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/cyber-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">cyber insurance<\/a>, you can call us on <strong>0345 222 5391<\/strong>. Or browse through <a href=\"https:\/\/www.policybee.co.uk\/blog\/?s=cyber+insurance\" type=\"link\" id=\"https:\/\/www.policybee.co.uk\/blog\/?s=cyber+insurance\" target=\"_blank\" rel=\"noreferrer noopener\">our blogs on cyber insurance<\/a>.<\/p>\n\n\n\n<p><em>Image created using assets from iStock.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing is the number one gateway to cybercrime. It\u2019s thought that up to 95% of cyber-attacks and data breaches start with a phishing attack. And that three quarters of phishing attacks begin with a deceptive email. Cybercriminals use them because &hellip; <a href=\"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[288,290,132],"tags":[310,300,158,162],"class_list":["post-27467","post","type-post","status-publish","format-standard","hentry","category-cyber-insurance","category-self-employed-and-freelance-advice","category-small-business-advice","tag-business-advice","tag-cyber-insurance-2","tag-cyber-insurance","tag-it-and-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>How to protect your small business from phishing attacks<\/title>\r\n<meta name=\"description\" content=\"Most cyber-attacks and data breaches start with a phishing email. Here&#039;s how to protect your small business from phishing attacks.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"How to protect your small business from phishing attacks\" \/>\r\n<meta property=\"og:description\" content=\"Most cyber-attacks and data breaches start with a phishing email. Here&#039;s how to protect your small business from phishing attacks.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks\" \/>\r\n<meta property=\"og:site_name\" content=\"PolicyBee news and risk advice\" \/>\r\n<meta property=\"article:published_time\" content=\"2026-02-20T08:49:01+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-04-28T13:02:53+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"300\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alexandra Williams\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:site\" content=\"@PolicyBee\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alexandra Williams\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks\"},\"author\":{\"name\":\"Alexandra Williams\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/9724de2ae82620a7e676af2668c960a0\"},\"headline\":\"How to protect your small business from phishing attacks\",\"datePublished\":\"2026-02-20T08:49:01+00:00\",\"dateModified\":\"2026-04-28T13:02:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks\"},\"wordCount\":1295,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Phishing-risks-blog-post-istock-edit.jpg\",\"keywords\":[\"business advice\",\"cyber insurance\",\"cyber liability insurance\",\"IT and technology\"],\"articleSection\":[\"Cyber insurance\",\"Self-employed &amp; freelance advice\",\"Small business advice\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks\",\"name\":\"How to protect your small business from phishing attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Phishing-risks-blog-post-istock-edit.jpg\",\"datePublished\":\"2026-02-20T08:49:01+00:00\",\"dateModified\":\"2026-04-28T13:02:53+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/9724de2ae82620a7e676af2668c960a0\"},\"description\":\"Most cyber-attacks and data breaches start with a phishing email. Here's how to protect your small business from phishing attacks.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Phishing-risks-blog-post-istock-edit.jpg\",\"contentUrl\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Phishing-risks-blog-post-istock-edit.jpg\",\"width\":600,\"height\":300,\"caption\":\"Being critical and asking the right questions can help you protect your small business from phishing attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/how-to-protect-your-small-business-from-phishing-attacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect your small business from phishing attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/\",\"name\":\"PolicyBee news and risk advice\",\"description\":\"Articles and information on professional indemnity insurance, small business news and risk management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.policybee.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/9724de2ae82620a7e676af2668c960a0\",\"name\":\"Alexandra Williams\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g\",\"caption\":\"Alexandra Williams\"}}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to protect your small business from phishing attacks","description":"Most cyber-attacks and data breaches start with a phishing email. Here's how to protect your small business from phishing attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks","og_locale":"en_GB","og_type":"article","og_title":"How to protect your small business from phishing attacks","og_description":"Most cyber-attacks and data breaches start with a phishing email. Here's how to protect your small business from phishing attacks.","og_url":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks","og_site_name":"PolicyBee news and risk advice","article_published_time":"2026-02-20T08:49:01+00:00","article_modified_time":"2026-04-28T13:02:53+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg","type":"image\/jpeg"}],"author":"Alexandra Williams","twitter_card":"summary_large_image","twitter_creator":"@PolicyBee","twitter_site":"@PolicyBee","twitter_misc":{"Written by":"Alexandra Williams","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#article","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks"},"author":{"name":"Alexandra Williams","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/9724de2ae82620a7e676af2668c960a0"},"headline":"How to protect your small business from phishing attacks","datePublished":"2026-02-20T08:49:01+00:00","dateModified":"2026-04-28T13:02:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks"},"wordCount":1295,"commentCount":0,"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg","keywords":["business advice","cyber insurance","cyber liability insurance","IT and technology"],"articleSection":["Cyber insurance","Self-employed &amp; freelance advice","Small business advice"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks","url":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks","name":"How to protect your small business from phishing attacks","isPartOf":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage"},"image":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage"},"thumbnailUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg","datePublished":"2026-02-20T08:49:01+00:00","dateModified":"2026-04-28T13:02:53+00:00","author":{"@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/9724de2ae82620a7e676af2668c960a0"},"description":"Most cyber-attacks and data breaches start with a phishing email. Here's how to protect your small business from phishing attacks.","breadcrumb":{"@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#primaryimage","url":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg","contentUrl":"https:\/\/www.policybee.co.uk\/blog\/wp-content\/uploads\/2026\/02\/Phishing-risks-blog-post-istock-edit.jpg","width":600,"height":300,"caption":"Being critical and asking the right questions can help you protect your small business from phishing attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.policybee.co.uk\/blog\/how-to-protect-your-small-business-from-phishing-attacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.policybee.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"How to protect your small business from phishing attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.policybee.co.uk\/blog\/#website","url":"https:\/\/www.policybee.co.uk\/blog\/","name":"PolicyBee news and risk advice","description":"Articles and information on professional indemnity insurance, small business news and risk management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.policybee.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.policybee.co.uk\/blog\/#\/schema\/person\/9724de2ae82620a7e676af2668c960a0","name":"Alexandra Williams","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3b0eaa7b26b964656e704113f072baed4b8281ebd63fa4f7924b0c96f3af817?s=96&d=mm&r=g","caption":"Alexandra Williams"}}]}},"_links":{"self":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=27467"}],"version-history":[{"count":9,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27467\/revisions"}],"predecessor-version":[{"id":27480,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27467\/revisions\/27480"}],"wp:attachment":[{"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=27467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=27467"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.policybee.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=27467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}