[Crawl-Date: 2026-04-19]
[Source: DataJelly Visibility Layer]
[URL: https://griffinitgroup.com/it-glossary/phishing]
---
title: What Is Phishing?
description: A cyberattack that uses disguised emails or messages to trick recipients into revealing sensitive information, clicking malicious links, or downloading ma...
url: https://griffinitgroup.com/it-glossary/phishing
canonical: https://griffinitgroup.com/it-glossary/phishing
og_title: What Is Phishing?
og_description: A cyberattack that uses disguised emails or messages to trick recipients into revealing sensitive information, clicking malicious links, or downloading ma...
og_image: https://griffinitgroup.com/griffin-logo-og.png
twitter_card: summary_large_image
twitter_image: https://griffinitgroup.com/griffin-logo-og.png
---

# What Is Phishing?
> A cyberattack that uses disguised emails or messages to trick recipients into revealing sensitive information, clicking malicious links, or downloading ma...

---

Security

Beginner
## What Is Phishing?
What Is Phishing? Phishing a cyberattack that uses disguised emails or messages to trick recipients into revealing sensitive information, clicking malicious links, or downloading malware. Phishing is one of the most common attack methods.

## Why This Matters for Your Business
Phishing accounts for over 80% of reported security incidents. A single clicked link can lead to ransomware encryption, wire fraud, or full network compromise. Employee security awareness training and email filtering are your primary defences against this persistent, evolving threat.

## Related Security Terms

[Beginner
## 2FA (Two-Factor Authentication)
A security process that requires users to provide two different authentication factors to verify their identity. This typically combines something you know (password) with something you have (phone) or something you are (fingerprint).](https://griffinitgroup.com/it-glossary/2fa) [Intermediate
## DLP (Data Loss Prevention)
A strategy and set of tools to prevent sensitive data from being lost, misused, or accessed by unauthorized users. DLP software detects potential data breaches and prevents them by monitoring, detecting, and blocking sensitive data.](https://griffinitgroup.com/it-glossary/dlp) [Intermediate
## EDR (Endpoint Detection and Response)
A cybersecurity solution that continuously monitors and responds to potential threats on endpoints like computers and servers. EDR tools detect, investigate, and respond to suspicious activities in real-time.](https://griffinitgroup.com/it-glossary/edr) [Intermediate
## Encryption
The process of converting data into a coded format that can only be read by someone with the correct decryption key. Encryption protects sensitive information from unauthorized access.](https://griffinitgroup.com/it-glossary/encryption)

[Performance EngineeringPrevious](https://griffinitgroup.com/it-glossary/performance-engineering) [All Terms](https://griffinitgroup.com/it-glossary) [Portfolio DriftNext](https://griffinitgroup.com/it-glossary/portfolio-drift)

## Need Help With Security?

Our team can help you understand and implement the right technology solutions for your business. Get expert guidance from local IT professionals.

[Schedule a Consultation](https://griffinitgroup.com/contact) [Call (289) 667-4000](tel:+12896674000)

## Discovery & Navigation
> Semantic links for AI agent traversal.

* [Home](https://griffinitgroup.com/)
* [About](https://griffinitgroup.com/about)
* [Services](https://griffinitgroup.com/services)
* [Blog](https://griffinitgroup.com/blog)
* [Contact](https://griffinitgroup.com/contact)
* [IT Glossary](https://griffinitgroup.com/it-glossary)
* [(289) 667-4000](tel:+12896674000)
* [info@griffinitgroup.com](mailto:info@griffinitgroup.com)
* [Site Map](https://griffinitgroup.com/sitemap)
* [Cybersecurity](https://griffinitgroup.com/small-business-cybersecurity)
* [Managed IT Services](https://griffinitgroup.com/managed-it-services-niagara)
* [Field Services](https://griffinitgroup.com/field-it-services-niagara)
* [Network Infrastructure](https://griffinitgroup.com/network-infrastructure-niagara)
* [Niagara Community Support](https://griffinitgroup.com/niagara-community-support)
* [Thorold](https://griffinitgroup.com/thorold-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-thorold)
* [St. Catharines](https://griffinitgroup.com/st-catharines-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-st-catharines)
* [Welland](https://griffinitgroup.com/welland-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-welland)
* [Niagara Falls](https://griffinitgroup.com/niagara-falls-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-niagara-falls)
* [Fort Erie](https://griffinitgroup.com/fort-erie-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-fort-erie)
* [Grimsby](https://griffinitgroup.com/grimsby-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-grimsby)
* [NOTL](https://griffinitgroup.com/niagara-on-the-lake-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-niagara-on-the-lake)
* [Ajax](https://griffinitgroup.com/ajax-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-ajax)
* [Burlington](https://griffinitgroup.com/burlington-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-burlington)
* [Hamilton](https://griffinitgroup.com/hamilton-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-hamilton)
* [Oakville](https://griffinitgroup.com/oakville-it-support)
* [Managed IT](https://griffinitgroup.com/managed-it-services-oakville)
* [Explore Our Full CapabilitiesIT Service Catalogue — 220+ Services Across 39 Domains](https://griffinitgroup.com/it-service-catalogue)
