You’ll know a little about it, no doubt – it’s where you receive an email from someone pretending to be someone else and contains a link or attachment that, if opened or downloaded, can instal malware onto your IT system.
As with most things, cybercrime has evolved, and many forms of phishing now exist.
This month’s guide The business owner’s guide to phishing explains the many variations of phishing so you can stay one step ahead.