What is Phishing?

Phishing is the act of attempting to manipulate the recipient of a malicious email into opening and engaging with it. A sender of a malicious email intends to deceive a victim by making the email seem important and from a reputable source. These phishing emails may include harmful attachments, like PDF or Word documents, which once opened can cause harm to the user’s computer by installing forms of malware, ransomware, or other unsavoury software. Phishing emails can also contain malicious links in the body that can lead a user to a fraudulent site. These sites are used to collect confidential information such as usernames and passwords, or to install malware onto a device. Once the victim’s information has been obtained, scammers will monetise the data by selling it to the highest bidder on Dark Web sites.

Types of Phishing

Deceptive Phishing is any attack by which fraudsters impersonate a legitimate company and attempt to steal people’s personal information or login credentials.

Spear Phishing is when fraudsters customise their attack emails with a target’s name, position, company, work phone number or other information in an attempt to trick the recipient into taking some action being requested by a known connection.

CEO Fraud is targeting an executive in an organisation. Fraudsters attempt to isolate an executive and steal their login credentials. With these credentials they are able to perform a CEO scam. CEO scams occur when an email, seemingly addressed from a CEO or other member of senior management, is falsely created by a scammer in order to exploit the trust of employees. The impostor email seeks for the target to wire funds or share confidential information with the scammer.

With the number of spam emails sent daily expected to increase to almost 190 billion a day through 2023, it’s increasingly important to be able to spot the tell-tale signs of a fraudulent email and protect your personal and business data, and your tech from malicious viruses and malware.


Find IT | Remove IT | Secure IT – Computer Rescue IT Security

Download our Free Phishing White Paper – Inside You’ll discover:

  • What Exactly is Phishing
  • The Types of Phishing
  • How to Identify a Phishing Attack
  • How to Avoid Falling Prey to Phishing
  • Free Dark Web & Phishing Scan for your Business

Our company was subjected to a Cyber attack which encrypted our entire server, the perpetrator gaining access through our remote log-in. We thought we had good security in place and were shocked when this happened.

Following the advice from Computer Rescue over the years it was clear that the support and backup systems we had in place had probably saved our business as within two days Computer Rescue had restored everything and we were able to continue trading. Without our data this would have been very unlikely.


Years Experience


Average Response Time


Calls Resolved within SLA


Resolved 1st Time


Happy Customers

Covering Kent and South East England. Computer Rescue is much more than simply a computer support company. We are a trusted partner and adviser helping you with the very best IT solutions.
Let’s get started


Office Manager

Computer Rescue staff are very helpful and cheerful at all times. I have never had any problems and I feel I am in very safe hands. Computer Rescue is very approachable, professional, courteous and a pleasure to do business with, and very quick to respond to calls for help.

Office Manager
Managing Partner

Computer Rescue are friendly and efficient and happy to try and resolve a problem out of hours if that is required. We enjoy our monthly visits and Computer Rescue are much better thankfully, compared to our previous provider.

Managing Partner
Recruitment Consultancy

Claim your Free IT Network and Cyber Security Assessment

Please contact our team or complete the form below. A representative will contact you shortly.

  • Let’s Talk

    We’ll chat about your business, how you use technology, and what you want to get out of IT.

  • Free IT Network and Cyber Security Assessment

    If we’re the right fit, you’ll choose the IT service agreement that works best for your organisation.

  • Start Your IT Experience

    Within days, you’ll be experiencing IT like never before.