{"id":50252,"date":"2024-12-05T01:34:27","date_gmt":"2024-12-05T08:34:27","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=glossary&#038;p=50252"},"modified":"2024-12-05T01:34:29","modified_gmt":"2024-12-05T08:34:29","slug":"what-is-phishing","status":"publish","type":"glossary","link":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing","title":{"rendered":"What Is Phishing?"},"content":{"rendered":"\n<p>Phishing is a type of a social engineering attack that involves manipulating human psychology to trick individuals into disclosing confidential information. Typically executed via email, social media, or instant messaging, phishing attacks are difficult to stop and costly to remediate.&nbsp;<\/p>\n\n\n\n<p>Understanding phishing and its mechanisms is crucial for protecting your sensitive data and enhancing your cybersecurity defenses. This post reveals the definition of phishing, its main types, and effective practices to prevent it.&nbsp;<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">What are phishing attacks?<\/h2>\n\n\n\n<p>Let\u2019s start with the meaning of phishing. The term &#8220;phishing&#8221; is a homophone of the word &#8220;fishing&#8221;. During a phishing attack, cybercriminals use bait \u2014 often in the form of tempting offers or urgent requests \u2014 to lure victims into providing their sensitive data, such as usernames, passwords, credit card numbers, or bank account information.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"246\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04073544\/1-What-is-phishing.svg\" alt=\"Phishing definition\" class=\"wp-image-50253\"\/><\/figure>\n\n\n\n<p>Cyberattackers behind phishing attacks often send fraudulent messages that appear to be from banks, government agencies, or trusted individuals. The goal of such messages is to trick the victim into visiting malicious websites, filling out fake forms, downloading malware, or revealing sensitive information through other channels.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How does phishing work?<\/h2>\n\n\n\n<p>Phishing works by playing on human emotions. The attacker creates a sense of urgency, curiosity, or fear to encourage individuals to take immediate action without thinking critically. Here\u2019s a breakdown of how phishing attacks typically occur step by step:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Preparation.<\/strong> The attacker creates a deceptive message, typically in the form of an email or text that mimics a trusted entity. This message may contain a request for sensitive information or an urgent call to action, such as &#8220;Your account will be blocked unless you verify your information&#8221;.<\/li>\n<\/ol>\n\n\n\n<p>Attackers can also use social media to gather a particular victim&#8217;s personal details, work history, and interests to craft a personalized message.<\/p>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li class=\"mb-2\"><strong>Delivery.<\/strong> The phishing message is sent to an individual or a group of individuals, who may be random or specifically targeted people.\u00a0<\/li>\n\n\n\n<li class=\"mb-2\"><strong>Engagement<\/strong>. Victims who fall for the bait either click on a malicious link or provide their sensitive information to cybercriminals.<\/li>\n\n\n\n<li><strong>Exploitation.<\/strong> Attackers then use the information obtained to compromise accounts, steal identities, install malware, or carry out fraud. They can also sell sensitive data on the dark web or exploit it to gain access to an organization&#8217;s IT systems.<\/li>\n<\/ol>\n\n\n\n<p>Although phishing attacks often involve some combination of these steps, not all attacks are identical. Below, we discuss the most common types of phishing attacks.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Main types of phishing attacks<\/h2>\n\n\n\n<p>Phishing comes in many forms, each with distinct tactics and objectives. Some of the most common schemes include:<\/p>\n\n\n\n\t\t<div  class=\"block-55aba93f-d4a0-41e0-be42-50d945135065 areoi-element container template-16 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b7cf6d65-ef84-4e64-9c3f-a8e4b32d443c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-50cc948d-8398-4e88-8053-521874815a45 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5dcf9cb4-a50d-4935-817c-d526f996b1ee areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4022e4d9-f2d8-4e6f-81e2-9b027e7adec8 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-113de618-d816-4dcb-ace7-c9211674a8c2 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Email phishing<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-eb0d1df7-b98a-4b4f-8512-ac14885739fa col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-3e47e8c0-fe0a-47c7-9166-d40171c64882 areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-73fc59e5-3d7f-4c9f-b64f-042dbe690338 row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-4fa6114a-9ce3-4f3b-95a0-3b432dfcb44c col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Spear phishing<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-10fe056a-7e7c-44e9-aba9-9f83e5a90e1a col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Whaling<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e2789fee-cdd2-4e54-b827-d7304e2a75bc col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Smishing (SMS phishing)<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-abc4a375-0129-40f7-89ac-dd069fcc0847 col areoi-element col-12 col-lg-6\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-2d38d511-c6da-4e19-a2b7-8831b29da7ad areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-18a9a1ce-aeb0-4413-be29-f4fec1f1f0ce row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-2d734441-aaa7-44c3-a11c-0752154d012d col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Vishing (voice phishing)<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-75c30e32-b4db-4b15-9448-cffa25c22499 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-33424547-4882-4dca-903f-67e64be58ebd areoi-element rounded-bg-13px h-100\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 65, 68,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-4a9eb362-4312-4550-a696-a4755ae9bf9e row areoi-element h-100\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-cdfcca69-6197-48e1-9cf6-b09c254d1f54 col areoi-element ps-3 ps-md-0 ps-lg-3 align-self-center col-9 col-xxl-10\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins mb-0 ps-xl-4\" style=\"font-size:1.25rem;font-style:normal;font-weight:600\">Pharming<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p><strong>Email phishing.<\/strong> This is the most common type of phishing, where attackers send malicious emails that appear to be from trusted sources like banks or popular services. These emails usually contain links to malware or fake websites created to steal personal information.<\/p>\n\n\n\n<p><strong>Spear phishing.<\/strong> This type of attack targets specific individuals or organizations. Attackers research their victims to craft more personalized and convincing messages that appear to be even more legitimate than those involved in a typical phishing attack.&nbsp;<\/p>\n\n\n\n<p><strong>Whaling.<\/strong> Whaling takes spear phishing a step further, targeting senior executives or decision-makers within an organization. The stakes in these attacks are higher, as they often involve hefty sums of money or proprietary information.&nbsp;<\/p>\n\n\n\n<p><strong>Smishing (SMS phishing).<\/strong> This tactic involves sending malicious links or instructions via text message. Unlike email services, which often have built-in spam filters, SMS messages don&#8217;t undergo filtering, which makes smishing attacks rather effective and widespread.<\/p>\n\n\n\n<p><strong>Vishing (voice phishing).<\/strong> In vishing, attackers use phone calls to trick individuals into providing personal or financial information. These attackers may pretend to be tech support workers, bank assistants, or government officials requesting that the victim urgently provide some type of sensitive information.<\/p>\n\n\n\n<p><strong>Pharming. <\/strong>In a pharming attack, the attacker redirects the victim to a fake website without their knowledge by exploiting vulnerabilities in the domain name system (DNS). Even if the victim types the correct website address, they are unknowingly redirected to a fraudulent site designed to capture login credentials, personal information, or credit card data.<\/p>\n\n\n\n<p>Regardless of the type of attack, phishing poses a significant threat to organizations, often leading to severe consequences if not properly addressed.<\/p>\n\n\n\n\t\t<div  class=\"block-0cd9f293-9069-40b7-95d7-acbb7952040d areoi-element container template-8 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-1b56cdd6-7676-4ace-884a-12e24291b16c areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\">Negative consequences of phishing attacks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-30dba833-b8c9-4525-abff-a14d566d2f60 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element row-cols-1 row-cols-md-3\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-style:normal;font-weight:600\">Data breaches<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-style:normal;font-weight:600\">Financial loss<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-style:normal;font-weight:600\">Reputational damage<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-28b3d633-1691-4973-8d7b-d2c1838773fc row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1765243f-d41b-4e37-8d4d-7c7bde2c1da0 col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-style:normal;font-weight:600\">Compliance issues<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-9a415ca8-ec08-44da-880c-17abb7f8a1de col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-style:normal;font-weight:600\">Operational disruptions<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p>Below, we\u2019ve outlined the most effective methods for preventing phishing attacks and minimizing their impact on your organization.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">How to prevent phishing<\/h2>\n\n\n\n<p>Preventing phishing attacks requires a comprehensive approach that involves both technical measures and human participation. Here are some of the most effective practices:<\/p>\n\n\n\n\t\t<div  class=\"block-253ec721-34e1-42de-abbb-aee7d658cc33 areoi-element container template-18 px-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\">Effective practices to prevent phishing<\/p>\n\n\n\n\t\t<div  class=\"block-c4e84c50-df67-4eb8-bee9-c579b399394c row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Conduct employee training<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Keep your software up-to-date<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Limit access privileges<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Implement multi-factor authentication (MFA)<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Use a password manager<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-7978b634-ba0e-4410-b4d3-0f8314c3d1c1 col areoi-element d-flex mb-4 col-12 col-xl-4\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-641407ef-2a7f-4e5a-9586-41a692fdefc0 areoi-element rounded-bg-13px d-flex w-100 align-items-center px-4 py-1\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(17, 207, 159,0.1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<figure class=\"wp-block-image size-large\" style=\"min-width:30px\"><img decoding=\"async\" width=\"25\" height=\"20\" src=\"https:\/\/www.syteca.com\/wp-content\/uploads\/2023\/03\/check-icon.svg\" alt=\"\" class=\"wp-image-10062\"\/><\/figure>\n\n\n\n<p class=\"p-poppins my-1 ms-4\" style=\"font-size:1.13rem;font-style:normal;font-weight:600\">Prepare an incident response plan<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h3 class=\"wp-block-heading\">Conduct employee training<\/h3>\n\n\n\n<p>Conduct cybersecurity awareness training regularly so that your employees know how to recognize phishing attacks and respond to them responsibly. Train your employees to treat every email as a potential phishing attempt and always scrutinize the sender&#8217;s details, unusual call-to-actions, and suspicious attachments. You may also want to simulate phishing attacks among your employees to ensure that everyone is staying vigilant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keep your software up-to-date&nbsp;<\/h3>\n\n\n\n<p>Phishing attacks can be especially damaging if your software isn&#8217;t up to date. An outdated browser, for example, may not have the latest security features or may be susceptible to unpatched exploits, which increases the risk of falling victim to malicious websites or scripts.&nbsp;<\/p>\n\n\n\n<p>Always ensure that your software, including browsers and operating systems, is up to date to minimize vulnerabilities that cybercriminals could exploit during phishing attacks.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Limit access privileges<\/h3>\n\n\n\n<p>Implement the <a href=\"\/en\/blog\/the-principle-of-least-privilege\" target=\"_blank\" rel=\"noreferrer noopener\">principle of least privilege<\/a> by ensuring employees have only the minimal level of access they need to do their jobs. If some of your employees fall victim to a phishing attack, the attacker\u2019s ability to access critical systems and assets will be limited. Regularly <a href=\"\/en\/blog\/user-access-review\" target=\"_blank\" rel=\"noreferrer noopener\">review and adjust access privileges<\/a> as employees&#8217; responsibilities change.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implement multi-factor authentication (MFA)<\/h3>\n\n\n\n<p>Enable MFA to enhance the security of your critical accounts and systems. Implementing MFA ensures that even if an attacker manages to obtain credentials through a phishing attack, they will still be unable to access your systems without completing the additional authentication steps.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use a password manager<\/h3>\n\n\n\n<p>Use cybersecurity solutions to <a href=\"\/en\/blog\/password-management-best-practices\" target=\"_blank\" rel=\"noreferrer noopener\">manage passwords<\/a>. With some password managers, your employees won\u2019t need to manually input passwords, which significantly reduces the risk of successful phishing scams. Choose password managers that can automatically change passwords on a regular basis, thus limiting the window of opportunity for attackers who may have acquired passwords through credential-stuffing attacks.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Prepare an incident response plan<\/h3>\n\n\n\n<p>An <a href=\"\/en\/blog\/incident-response-plan-tips\" target=\"_blank\" rel=\"noreferrer noopener\">incident response plan<\/a> can help you effectively manage phishing attacks. Your incident response plan should specify immediate actions to respond to phishing attacks such as isolating compromised systems to prevent further damage and notifying affected parties to mitigate the impact. Additionally, you should define the main steps for containment, eradication, and recovery from phishing attacks.<\/p>\n\n\n\n<p><a href=\"\/en\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Syteca<\/strong><\/a> is a reliable provider of privileged access management and user activity monitoring solutions trusted by Visa, Samsung, Panasonic, and other global companies. Our cybersecurity platform can help you enforce <a href=\"\/en\/two-factor-authentication-tool\" target=\"_blank\" rel=\"noreferrer noopener\">two-factor authentication<\/a>, <a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">granularly grant access to your critical endpoints<\/a>, <a href=\"\/en\/product\/workforce-password-management\" target=\"_blank\" rel=\"noreferrer noopener\">optimize workforce password management<\/a>, <a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">get visibility into user actions<\/a>, and timely <a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">respond to suspicious activity<\/a>.<\/p>\n\n\n\n<p>With Syteca PAM and UAM, you can quickly identify and mitigate any attempted phishing attack, therefore protecting your sensitive data and strengthening your overall cybersecurity posture.<\/p>\n\n\n\n\t\t<div  class=\"block-a8e75f3e-ba02-48d4-b163-b384a0d45118 areoi-element container pattern-request-demo-2 rounded-bg-13px\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 235,0.15)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-95b66690-21b1-45a7-ae10-27a8780aac8a row areoi-element align-items-center row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-9e962fe6-f77f-40f9-898c-abaef3f48ccb col areoi-element d-flex flex-wrap flex-column align-items-center align-items-md-start col-md-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-left p-poppins pt-3 text-center text-md-start lh-sm has-text-color\" style=\"color:#1a3b4e;font-size:1.75rem;font-style:normal;font-weight:600\">Want to try Syteca? Request access<br>to the online demo!<\/p>\n\n\n\n<p class=\"has-text-align-left p-poppins pb-3 text-center text-md-start\" style=\"font-style:normal;font-weight:500\">See why clients from 70+ countries already use Syteca.<\/p>\n\n\n\n\t\t\t\t\n\t\t<button data-bs-target=\"#hsModal-demo\" data-bs-toggle=\"modal\" \n\t\t\t\n\t\t\tclass=\"block-9170fdac-8fec-4c73-a86c-338093dbf9d9 btn areoi-has-url position-relative me-lg-2  me-md-2 me-sm-2 me-lg-4 mb-3 hsBtn-demo btn-info  btn-info\"\n\t >\n\t\t\t\t\t\n\t\t\t\t\tAccess the Demo Portal \n\t\t\t\t\t\n\t\t\t\t\t \n\t\t\t\t<\/button>\n\t\t\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-f840f051-f300-4ade-9e70-68d6c65e619d col areoi-element col-md-6 d-none d-sm-none d-md-block\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"369\" height=\"248\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png\" alt=\"\" class=\"wp-image-24868\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584.png 369w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2023\/06\/02014220\/Group-584-300x202.png 300w\" sizes=\"(max-width: 369px) 100vw, 369px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":50261,"menu_order":0,"template":"","class_list":["post-50252","glossary","type-glossary","status-publish","has-post-thumbnail","hentry","glossary_category-data-protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Phishing? \u2014 Syteca<\/title>\n<meta name=\"description\" content=\"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Phishing? \u2014 Syteca\" \/>\n<meta property=\"og:description\" content=\"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T08:34:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074855\/OG-What-is-phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074905\/OG-TW-What-is-phishing.png\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing\",\"url\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing\",\"name\":\"What is Phishing? \u2014 Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png\",\"datePublished\":\"2024-12-05T08:34:27+00:00\",\"dateModified\":\"2024-12-05T08:34:29+00:00\",\"description\":\"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png\",\"width\":1920,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Glossary\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data protection\",\"item\":\"https:\/\/www.syteca.com\/en\/glossary-category\/data-protection\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What Is Phishing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Phishing? \u2014 Syteca","description":"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing","og_locale":"en_US","og_type":"article","og_title":"What is Phishing? \u2014 Syteca","og_description":"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.","og_url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing","og_site_name":"Syteca","article_modified_time":"2024-12-05T08:34:29+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074855\/OG-What-is-phishing.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074905\/OG-TW-What-is-phishing.png","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing","url":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing","name":"What is Phishing? \u2014 Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png","datePublished":"2024-12-05T08:34:27+00:00","dateModified":"2024-12-05T08:34:29+00:00","description":"Read this post to learn the meaning of phishing and the main types of phishing attacks. Discover how these attacks are executed and how to prevent them.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/12\/04074813\/banner-What-is-phishing.png","width":1920,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/glossary\/what-is-phishing#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Glossary","item":"https:\/\/www.syteca.com\/en\/glossary"},{"@type":"ListItem","position":2,"name":"Data protection","item":"https:\/\/www.syteca.com\/en\/glossary-category\/data-protection"},{"@type":"ListItem","position":3,"name":"What Is Phishing?"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary\/50252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/glossary"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/50261"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=50252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}