Home / Blog / Article
Security Awareness 23 March 2026 7 min read

How to spot a phishing email in 2026 — and what to do if someone in your team clicks one

The "Nigerian prince" era of phishing is long gone. Modern attacks are targeted, well-written, and often reference real information about your business or your team. Here's what phishing actually looks like now, the red flags that still give it away, and the exact steps to take if a click happens.

Share

Phishing is the entry point for the majority of business cyber incidents. Not ransomware deployed directly onto a server. Not a sophisticated zero-day exploit. An email that tricks someone into handing over their login credentials or clicking a link that installs malware. It's mundane, it's effective, and it's why security awareness still matters even when every other control is in place.

The challenge in 2026 is that phishing emails have become significantly harder to spot. AI-generated text has removed most of the tell-tale grammar errors. Attacks are increasingly personalised — referencing your actual suppliers, your team members, your recent activity. And the most dangerous versions come not from external addresses but from legitimate accounts that have already been compromised.

What modern phishing actually looks like

Forget the obvious: misspelled words, dodgy formatting, generic greetings from people you've never heard of. Contemporary phishing includes:

"The most dangerous phishing email isn't obviously suspicious. It's one that looks exactly like an email you'd expect to receive — from a person you know, about something relevant to you, right now."

The warning signs that still give phishing away

Even well-crafted phishing attacks usually have at least one of these signals. Teaching your team to pause and check when they see any of them is worth more than any technical filter.

Urgency designed to stop you thinking

Phishing creates pressure to act immediately: "Your account will be suspended in 24 hours." "This invoice is overdue." "I need this done before end of business today." The urgency is the mechanism — it's designed to override the instinct to check. Any email that creates pressure to act without verification should be treated with extra suspicion, not less.

A link that doesn't match what it claims to be

Hover over any link before you click it. The actual URL it points to appears in the bottom of your browser or email client. If an email from your "Google account" links to a domain that isn't google.com, stop. If an invoice from a known supplier links to a domain you don't recognise, stop. The display text can say anything — the actual URL is what matters.

Quick check before clicking any link

On desktop: hover over the link and check the URL in the status bar at the bottom of the screen. On mobile: long-press the link to preview the URL before opening it. If the domain doesn't match the organisation it claims to be from, don't click.

An unexpected request involving credentials or payment

Any email asking you to enter login credentials, confirm payment details, or approve a financial transaction should be verified through a separate channel — a phone call to a known number, or a direct message through a channel you trust. Not by replying to the email. Not by clicking a link in the email. Out of band verification, every time.

An attachment that asks you to enable something

Macro-enabled documents — Word files, Excel spreadsheets that ask you to "enable content" when you open them — are a common malware delivery mechanism. If you receive a document from someone you don't know well, or from anyone in an unexpected context, and it asks you to enable macros or editing, don't do it. Report it instead.

What to do if someone on your team clicks a phishing link

The response matters as much as the click itself. The window between "clicked" and "attacker has done something useful" can be very short — minutes in some cases, hours in others. Here's the immediate response:

1 Don't panic, don't minimise it

The person who clicked is going to feel embarrassed. Make sure they know the priority is responding quickly, not assigning blame. You want people to report suspected clicks immediately — a culture where people hide mistakes because they're afraid of consequences means incidents go undetected for longer.

2 Disconnect the device from the network

If the click may have resulted in a file download or malware installation, disconnecting the device (turn off Wi-Fi, unplug Ethernet) limits the attacker's ability to communicate with the infected machine or move laterally across the network.

3 Change passwords and revoke sessions immediately

If the person entered credentials anywhere as a result of the click, change those passwords now. In the Google Admin Console, an admin can reset a user's password and sign them out of all active sessions simultaneously. Do this before the attacker has a chance to establish persistence in the account.

In the Admin Console

Directory → Users → select the affected user → Reset password (tick "Require password change") → More → Sign out of all sessions. This invalidates all existing session tokens immediately.

4 Check for email forwarding rules

One of the first things attackers do after gaining access to an email account is set up a forwarding rule to send all incoming mail to an address they control. Check the affected account's Gmail settings for any forwarding rules that weren't there before. Remove them immediately.

Have a plan before an incident happens

Managed GetBulwark clients have a documented incident response process — and 24/7 endpoint monitoring that detects compromise before it becomes a full breach.

See what's included

5 Check the Admin Console Alert Centre

Google's Alert Centre often flags suspicious account activity within minutes of a compromise. Check it as part of your immediate response. Look for alerts about the affected user's account, any suspicious login events, or anomalous data access. This gives you a timeline of what the attacker may have accessed.

The broader point: having MFA enforced means that even if credentials are captured in a phishing attack, the attacker needs the second factor too. This is why MFA is the single most impactful control — not because it makes phishing impossible, but because it limits the blast radius of a successful credential harvest to almost nothing.

Callum Fraser, Founder of GetBulwark
Callum Fraser
Founder, GetBulwark · Google Workspace Specialist

Read next

Incident Response

The first 60 minutes of a security incident

The full incident response process — what to do hour by hour

Email Security

What is business email compromise

How attackers use email to steal from small businesses

Most Workspace accounts have never been audited.

Find out where yours stands. 45 minutes, 20 controls reviewed, written report. The report is yours to keep.

Book your free audit