Beware: Is that Microsoft… or a phishing attempt

When you get an email from Microsoft, you probably don’t think twice about opening it. Right?  After all, it’s Microsoft. One of the biggest, most trusted tech companies in the world.


But what if that email isn’t from Microsoft at all?

Cyber criminals love using trusted brands to trick people. And right now, Microsoft is the most impersonated company in the world when it comes to phishing scams.

In fact, new research shows that 36% of brand-related phishing attacks in early 2025 were pretending to be Microsoft.  That’s a huge number!

Google and Apple were next on the list. Together, the three tech giants made up more than half of all phishing scams.  So, what’s going on? And more importantly, how can you keep your business safe?

What is Phishing?

 Phishing is when a criminal sends you a fake email, text, or message that looks like it’s from a real company. One you know and trust.  The goal is to get you to click on a link, open a malicious attachment, or hand over sensitive information like passwords, credit card numbers, or even your full identity. 

Once that happens, the consequences can be nasty: Stolen money, hacked systems, confidential data leaks. And a world of pain for your business. 

The worst part: Phishing emails are getting smarter. There’s a lot less bad spelling and suspicious-looking links.

Scammers copy real company logos. Set up fake websites that look exactly like the real thing. They even spoof email addresses so it looks like the message really is coming from Microsoft, Google, or Apple.

In fact, researchers recently found a rise in phishing attacks pretending to be Mastercard. Fake websites are tricking people into entering their card details.

It’s a worrying trend, and it shows that cyber criminals are constantly finding new ways to catch people out.

What can you do

So, how can you tell if that email from Microsoft is the real deal, or a dangerous fake?   It’s all about slowing down and staying sharp.

Real emails from companies like Microsoft will never pressure you into urgent actions like “Click this link immediately or your account will be locked.” That kind of language is a big red flag.

Always check the sender’s email address carefully. At first glance it might look right, but a closer look could reveal slight changes. Like “micros0ft.com” instead of “microsoft.com”. Cyber criminals rely on you not noticing these small details.
 

And whatever you do, don’t click on links straight from an email you’re not sure about. If in doubt, go to your browser and type the official website address manually. It’s always safer that way.

Being cautious might feel like a hassle sometimes. But it’s nothing compared to the hassle of cleaning up after a cyber attack.

Phishing scams are only going to get more convincing. That’s why it’s vital to: 

  • Stay alert
  • Invest in good cyber security tools
  • Use smart protections like multi-factor authentication (where you need two forms of ID to log in, not just a password)

Remember: The more trusted the brand, the bigger the target it becomes for scammers.
And that email that looks like it’s from Microsoft? It might just be a wolf in sheep’s clothing. 

We can help you and your team stay better protected – and more vigilant – against phishing scams like these. Get in touch.

What next?

One of my passions is helping businesses to succeed and if I can help you save some money as well – even better. You can fill out our contact form, phone us or click on the appointment button below and let’s start a conversation to see if I can help your business. Our guarantee:

  • There are no hidden charges – this is a 100% free 15 minute consultation with no hidden charges.
  • We will never spam you or sell on your contact details.
  • We will treat your information with absolute confidentiality.

Other Posts for you to Enjoy

Windows 10 Extended Security Update

Windows 10 End of Life is in October 2025 but Microsoft is now allowing the purchase of an Extended Security Update. With different options for businesses and individuals this article looks at what is included in the program and likely costs for subscription.

Let’s operate in the “Arena”

  Introduction Back in 2002 the media did their usual frenzied attack on Donald Rumsfeld after he introduced them to the conept of "Known Unknowns" and "Unknown Unknowns": “Reports that say that something hasn't happened are always interesting to me, because as...

Buy IT Equipment Now – Budget 2023

Introduction For the next few days at least small businesses have a choice to make when investing in IT equipment. There is super deduction and now full expensing.  Which one is best for your business depends on how much profit you plan to make over the next 12...

What is the difference between a MSP and IT support

What is the difference between IT Support and a managed service provider (MSP). By understanding the difference you will be better able to choose the right type of support for your business.

LastPass Security Breach

LastPass is a password management utility and application allowing companies and people to store their passwords. After a recent breach there are some serious security issues that need attention. This article looks at what these issues are and how to re-secure your passwords.

IT Security: Folina Vulnerability Fixed

IT security update: Folina vulnerability has been fixed by Microsoft. How to ensure your system is protected and reverse the temporary fix we suggested.

IT Security: Zero Day Attack – Take Action Now

A new zero day attack is in progress and it threatens all computer systems that have Microsoft Office installed. A simple piece of code will thwart this attack until Microsoft have had a chance to release a patch

Business IT Security – Using 2FA

Business IT security is often about doing the basics really well, like securing your accounts using 2FA. In this post find out why 2FA helps to keep your business cyber secure

Man In The Middle – Behind the Hack [Video Guide]

Cybersecurity (cyber security) is a buzzword that seems to have appeared relatively quickly in the world of business IT.  If you search the term “cybersecurity” or “cyber security” on the BBC News website, there are currently 29 pages of articles from the last 2...

WordPress Security – Attacks leave 1.6 million sites damaged

Are you confident that your WordPress website is secure? Yesterday, on the 9th of December 2021, 1.6 Million WordPress Sites were Hit With 13.7 Million Attacks In 36 Hours From 16,000 IPs. It’s safe to say this is a major concern to businesses everywhere. WordPress...

Man In The Middle – Behind the Hack [Video Guide]

Cybersecurity (cyber security) is a buzzword that seems to have appeared relatively quickly in the world of business IT.  If you search the term “cybersecurity” or “cyber security” on the BBC News website, there are currently 29 pages of articles from the last 2...

New Dark Web Monitoring Tool Available from Absolutely PC

How much of your business and personal data is available online? The results could surprise you. With small business in the UK alone targeted by up to 65,000 attempted cyber attacks per day, data breaches and leaks are becoming an increasingly common occurrence. Once...

New Password Management Tool Available from Absolutely PC

With cyber attacks on the rise and remote working becoming commonplace, now, more than ever - businesses need to keep on top of the security of their passwords or be at risk of suffering a costly data breach. A study by Verizon Data Breach Investigations found that...

Can your business cope with winter disruption?

Thanks to the unseasonably mild weather we’ve enjoyed this autumn, it’s easy to forget that winter, and all the potential havoc it can wreak, is soon to follow. It’s hard not to feel that our weather has become more unpredictable and freak storms just aren’t, well,...

Eternal Blue – Behind the Hack [Video Guide]

What would you do if a hacker had access to all of your sensitive documents and data through a machine that they had exploited, with access to control your webcam as well as monitor the screen and keyboard? It’s not something out of action movie, what we’re describing...

8.4 Billion Passwords Leaked In “RockYou2021” Hack – How To Protect Your Business

The largest password collection of all time was recently leaked onto a hacker forum, with an eye-watering 8,459,060,239 (8.4 billion) unique entries stored in a 100GB TXT file putting potentially billions of logins at risk.  Dubbed as ‘RockYou2021’ after the RockYou...

Ransomware – Behind the Hack [Video Guide]

How would your business react if you were locked out of every single file stored on any PC or cloud platform in your network, with the only way to free your data being to pay vast sums of money to a hacker? Well, ransomware does just that. Despite how crippling this...

How to Protect your Business from Cybersecurity Threats

With UK small businesses targeted with 65,000 attempted cyber attacks per day, having robust measures to deal with cyber security threats is more important than ever. The recent attack on SolarWinds proves that no business is safe from hackers and that businesses both...

Have you made these IT upgrades?

Technology is constantly changing and adapting; as such, it is important to always stay on top of upgrades to ensure you are running at optimum efficiency. At Absolutely PC, IT upgrades are a necessary and consistent part of our monthly and annual maintenance...

LastPass Security Breach

LastPass is a password management utility and application allowing companies and people to store their passwords. After a recent breach there are some serious security issues that need attention. This article looks at what these issues are and how to re-secure your passwords.