What technical methods can you use to counteract phishing attempts?
18th June 2025
Beyond training and awareness, what steps can you take to ensure your IT is as protected from phishing attempts as it can be?
While all methods of cyber-attack are wrong, as a breach can serious harm an individual, be it financially or reputationally, some are worse than others. We find phishing particularly abhorrent because it prays on a lack of awareness and uses manipulative social engineering tactics to draw information out of victims.
We’ve explained before how to spot phishing attempts, as training and awareness is still the best method against this type of crime, but what are the technical steps you can take to ensure you have the best protection possible?
1. Spam or quarantine filters: most email services have built in filters that detect and block phishing emails. However, the standard filters are rarely 100% effective – instead, if you or your IT support set up designated rules, things to look out for that the quarantine will remove, you are more likely to filter out malicious emails. True, a few authentic emails may be caught in the filters, but the extra protection is worth it!
2. Enable multi-factor authentication (MFA): while far from unbreachable, MFA does provide another step that bad actors have to take before they can get to your details, making it a useful deterrent.
3. Use anti-phishing browser extensions: these extensions can warn you about suspicious websites before you access them. If you are unsure of which extension to use or how to use it, talk to your cyber security provider and they can guide you.
4. Keep software updated: if you keep all your software patched, your security will be as up to date and robust as it can be. It may be something that we often push to “remind me later” but a new update could be the difference between a phishing attempt reaching you or not.
5. Use a password manager: password managers autofill login and password details only on legitimate websites. Therefore, using a password manager can help you to avoid fake login pages.
While none of these methods are foolproof, as every day hackers think up new methods of breaching systems and scamming information out of people, these technical implementations will help to mitigate the amount that get to your inbox.
Remember, be vigilant at all times and if you’re unsure, consult your cyber security provider (or talk to Interfuture Security).