What the heck is a Phish?

Phish. Not fish. And not this Phish.

In the cybersecurity world, to "phish" is to "fish" for information, most often seen over email.

"Phishing: A technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person."

-- National Institute of Standard and Technology

You've probably seen them - a Nigerian prince with too much money, or a cute girl who needs your assistance. What the attacker is trying to do is ascertain private information in an attempt to use it for later gain. 

Cybercrime statistics presented by Scalable Business Technologies of Murfreesboro, TN. Nashville. Managed IT Service Provider. Tech Support. IT Support. Coordinated physical and cybersecurity. Scalable IT is an MSP.
They may steal money, damage reputation, launch a ransomware attack, commit identity fraud, and a host of other malicious activities.

We named this blog No Phish Left Behind as a play on words, but also because there's a larger, lesser known aspect of cybersecurity: 

Humans are the weakest link in cybersecurity and phishing is the most profitable point of entry.

"Your organization is most likely spending 10x to 20x the time and resources securing technology as it does securing the HumanOS. And organizations still wonder why the human is the weakest link."

-- SANS Institute 

When it comes to crime prevention, and since cybersecurity is the largest - and most profitable - criminal arena, education is the best - and most profitable - deterrent.

Please take the time to review our Cybersecurity Education section here, and reach out to us at nplb@scalablebiztech.com if you'd like to schedule a training session for your team.


"An investment in knowledge pays the best interest."

-- Benjamin Franklin