{"id":2749,"date":"2026-04-03T10:00:00","date_gmt":"2026-04-03T02:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=2749"},"modified":"2026-03-06T15:07:05","modified_gmt":"2026-03-06T07:07:05","slug":"what-phishing-actually-means","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/","title":{"rendered":"Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1 undefined\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means<\/span><\/h2><p class=\"eb-ah-subtitle\">April 03, 2026<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-1024x538.jpg\" alt=\"What &quot;Phishing&quot; Actually Means\" class=\"wp-image-2750\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>In the world of cybersecurity, we use a lot of fancy words \u2014 firewalls, encryption, multi-factor authentication. But the most dangerous threat to your company\u2019s security isn\u2019t a high-tech &#8220;hack&#8221;. It\u2019s a simple trick called <strong>phishing<\/strong>.<\/p>\n\n\n\n<p>If you\u2019ve ever received a weird email from &#8220;the IT department&#8221; or a sudden urgent request from your &#8220;CEO&#8221;, you\u2019ve already been a target. <\/p>\n\n\n\n<p>Here is the plain-English breakdown of what phishing is and how to stay off the hook.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What is Phishing?<\/h2>\n\n\n\n<p>The name is a play on <strong>fishing<\/strong>. Just like a fisherman puts a worm on a hook to trick a fish, a cybercriminal puts a &#8220;lure&#8221; (a fake email) in your inbox to trick <em>you<\/em>.<\/p>\n\n\n\n<p>They aren&#8217;t trying to &#8220;break into&#8221; your computer. They are trying to get you to <strong>invite them in<\/strong>. <br>They want you to:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Click a link<\/strong> that leads to a fake login page.<\/li>\n\n\n\n<li><strong>Open an attachment<\/strong> that secretly installs a virus.<\/li>\n\n\n\n<li><strong>Send money<\/strong> or sensitive data directly to them.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The &#8220;Big Three&#8221; Tactics to Watch For<\/h2>\n\n\n\n<p>Modern phishing has evolved. In 2026, scammers don\u2019t just send generic &#8220;You won the lottery!&#8221; emails. They use these specific, business-focused tactics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Impersonator (<a href=\"https:\/\/lookafter.com\/blog\/safeguarding-against-spear-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spear Phishing<\/a>):<\/strong> This email is personalized. It might use your name, mention a real project you\u2019re working on, or look like it\u2019s from your actual boss.<\/li>\n\n\n\n<li><strong>The Urgent Crisis:<\/strong> &#8220;Your account will be deleted in 2 hours&#8221;, or &#8220;Invoice #492 is 30 days overdue&#8221;. They want you to panic and click before you think.<\/li>\n\n\n\n<li><strong>The Trusted Tool:<\/strong> You get a notification from &#8220;Microsoft&#8221;, &#8220;Zoom&#8221;, or &#8220;DocuSign&#8221; saying you have a new message or need to reset your password. The page looks identical to the real thing, but it\u2019s a trap.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">5 Red Flags You Can Spot in Seconds<\/h2>\n\n\n\n<p>You don\u2019t need to be a computer genius to spot a phish. Just look for these &#8220;tells&#8221;:<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><thead><tr><th><strong>Red Flag<\/strong><\/th><th><strong>What to Look For<\/strong><\/th><\/tr><\/thead><tbody><tr><td><strong>The &#8220;From&#8221; Address<\/strong><\/td><td>Hover your mouse over the sender\u2019s name. If it says &#8220;Microsoft Support&#8221; but the address is admin@support-office-update365.com, delete it.<\/td><\/tr><tr><td><strong>Generic Greetings<\/strong><\/td><td>Legitimate companies you work with usually know your name. &#8220;Dear Customer&#8221; or &#8220;Dear Employee&#8221; is a common sign of a mass attack.<\/td><\/tr><tr><td><strong>The &#8220;Hover&#8221; Test<\/strong><\/td><td>Before clicking any link, hover your mouse over it. A small box will show you where the link <em>really<\/em> goes. If it looks like a string of random gibberish, don\u2019t click.<\/td><\/tr><tr><td><strong>Strange Attachments<\/strong><\/td><td>Be wary of .zip, .html, or even .pdf files you weren&#8217;t expecting, especially if they claim to be an &#8220;invoice&#8221; for something you didn&#8217;t buy.<\/td><\/tr><tr><td><strong>The &#8220;Off&#8221; Tone<\/strong><\/td><td>Does your CEO usually sign emails with &#8220;Best Regards&#8221; or just &#8220;Thanks&#8221;? Does the email have weird typos? Trust your gut.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What to Do If You Get One<\/h2>\n\n\n\n<p>If an email feels &#8220;off&#8221;, <strong>do not click anything.<\/strong> Instead:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Verify via a different channel:<\/strong> If your boss asks for an urgent wire transfer, don&#8217;t reply to the email. Text them or call them on the phone to ask, &#8220;Did you just send this?&#8221;<\/li>\n\n\n\n<li><strong>Report it:<\/strong> If you suspect an email is a phish, please forward it to your IT team or email hosting provider immediately. This helps them analyze the threat and block the attacker for the entire company.<\/li>\n\n\n\n<li><strong>Go to the source:<\/strong> If &#8220;Netflix&#8221; says your payment failed, don&#8217;t click the link in the email. Close your email, open your browser, and type netflix.com manually to check your account.<\/li>\n<\/ol>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>Cybercriminals aren&#8217;t looking for the smartest computer; they\u2019re looking for the busiest person. By taking just five seconds to &#8220;pause before you click&#8221;, you can be the strongest shield your company has.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to &#8220;invite&#8221; a scammer in. Learn how to spot the red flags and keep your business secure.<\/p>\n","protected":false},"author":1,"featured_media":2750,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"content\",\"tags\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-2749","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hook, Line, and Sinker: What &quot;Phishing&quot; Actually Means<\/title>\n<meta name=\"description\" content=\"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to &quot;invite&quot; a scammer in. Learn how to spot the red flags and keep your business secure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hook, Line, and Sinker: What &quot;Phishing&quot; Actually Means\" \/>\n<meta property=\"og:description\" content=\"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to &quot;invite&quot; a scammer in. Learn how to spot the red flags and keep your business secure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-03T02:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/person\\\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means\",\"datePublished\":\"2026-04-03T02:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/\"},\"wordCount\":642,\"publisher\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/What-does-phishing-actually-means.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/\",\"name\":\"Hook, Line, and Sinker: What \\\"Phishing\\\" Actually Means\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/What-does-phishing-actually-means.jpg\",\"datePublished\":\"2026-04-03T02:00:00+00:00\",\"description\":\"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to \\\"invite\\\" a scammer in. Learn how to spot the red flags and keep your business secure.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#primaryimage\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/What-does-phishing-actually-means.jpg\",\"contentUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/What-does-phishing-actually-means.jpg\",\"width\":1200,\"height\":630,\"caption\":\"What \\\"Phishing\\\" Actually Means\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/what-phishing-actually-means\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/person\\\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\\\/\\\/lookafter.com\\\/blog\"],\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hook, Line, and Sinker: What \"Phishing\" Actually Means","description":"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to \"invite\" a scammer in. Learn how to spot the red flags and keep your business secure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/","og_locale":"en_US","og_type":"article","og_title":"Hook, Line, and Sinker: What \"Phishing\" Actually Means","og_description":"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to \"invite\" a scammer in. Learn how to spot the red flags and keep your business secure.","og_url":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2026-04-03T02:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means","datePublished":"2026-04-03T02:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/"},"wordCount":642,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/","url":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/","name":"Hook, Line, and Sinker: What \"Phishing\" Actually Means","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg","datePublished":"2026-04-03T02:00:00+00:00","description":"Phishing isn\u2019t a high-tech hack; it\u2019s a trick to get you to \"invite\" a scammer in. Learn how to spot the red flags and keep your business secure.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/03\/What-does-phishing-actually-means.jpg","width":1200,"height":630,"caption":"What \"Phishing\" Actually Means"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/what-phishing-actually-means\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hook, Line, and Sinker: What &#8220;Phishing&#8221; Actually Means"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=2749"}],"version-history":[{"count":2,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2749\/revisions"}],"predecessor-version":[{"id":2753,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2749\/revisions\/2753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/2750"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=2749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=2749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=2749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}