{"id":80014,"date":"2023-08-17T09:50:00","date_gmt":"2023-08-17T09:50:00","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=80014"},"modified":"2026-03-11T20:56:28","modified_gmt":"2026-03-11T20:56:28","slug":"phishing-outlook-2023-statistics-and-best-practices","status":"publish","type":"post","link":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/","title":{"rendered":"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"80014\" class=\"elementor elementor-80014\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d902e9d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d902e9d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-471ea59\" data-id=\"471ea59\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db9a048 elementor-hidden-mobile elementor-widget elementor-widget-image\" data-id=\"db9a048\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-banner.jpg\" class=\"attachment-full size-full wp-image-80016\" alt=\"phishing outlook\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-banner.jpg 1024w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-banner-300x153.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-banner-768x391.jpg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7603c5d elementor-hidden-desktop elementor-hidden-tablet elementor-widget elementor-widget-image\" data-id=\"7603c5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"#form\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"521\" height=\"521\" src=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg\" class=\"attachment-full size-full wp-image-80017\" alt=\"\" srcset=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg 521w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail-300x300.jpg 300w, https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail-150x150.jpg 150w\" sizes=\"(max-width: 521px) 100vw, 521px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6982df4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6982df4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e77869c\" data-id=\"e77869c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd9aaa6 elementor-widget elementor-widget-heading\" data-id=\"bd9aaa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-f5845d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f5845d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5897b22\" data-id=\"5897b22\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3889e52 elementor-widget elementor-widget-post-info\" data-id=\"3889e52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a4968b2 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>August 17, 2023<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-5dadb57 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"#author\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tGraham Thomson\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-45d48a4 elementor-inline-item\">\n\t\t\t\t\t\t<a href=\"\/cybersecurity-exchange\/network-security\/\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\tNetwork Security\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-627b3f0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"627b3f0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-35054e6\" data-id=\"35054e6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12e9888 elementor-widget elementor-widget-text-editor\" data-id=\"12e9888\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the ever-changing world of cybersecurity, phishing attacks have emerged as a significant and deceptive threat, exploiting the human element and posing a challenge to organizations. In EC-Council&#8217;s latest whitepaper titled &#8220;Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices,&#8221; authored by Graham Thomson, CISO at Irwin Mitchell, we delve into some of the most notorious email phishing incidents of the 21st century. By analyzing these incidents, we identify where companies faltered and provide insights on how they could better protect themselves.<\/p>\n<p>This comprehensive whitepaper guides organizations, offering valuable best practices and insights to bolster their cybersecurity defenses against phishing attacks. It explores various phishing incidents from the 21st century that have significantly impacted the cybersecurity and digital landscape. By examining real-world case studies and industry trends, the whitepaper sheds light on the vulnerabilities that inspire phishing attacks and their impact on organizations and offers actionable recommendations to mitigate such risks.<\/p>\n<p>Graham Thomson, a highly esteemed industry expert with extensive experience in information security, shares his valuable insights in this whitepaper. He emphasizes the role of social media in phishing attempts and the importance of security awareness in recognizing and avoiding phishing scams.<\/p>\n<p>Furthermore, the whitepaper delves into critical strategies employed by cybercriminals, such as cryptocurrency usage, giveaways, quizzes, and exploiting customer support as vectors for mounting phishing attacks. It provides a detailed report on different types of phishing, their trends, and their impact on information security.<\/p>\n<p>In conclusion, &#8220;Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices Securing the Future of Finance: Top Cybersecurity Best Practices for Financial Institutions&#8221; is an indispensable resource for organizations aiming to protect their assets, customers, and reputation in the face of evolving phishing threats. By implementing the recommended best practices outlined in this whitepaper, businesses can enhance their cybersecurity posture and establish a robust defense against potential cyber-attacks.<\/p>\n<p>To gain an in-depth outlook on phishing trends 2023, you can download the full whitepaper by providing your details in the form below. Stay ahead of cyber threats and ensure the security of your business.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the ever-changing world of cybersecurity, phishing attacks have emerged as a significant and deceptive threat, exploiting the human element and posing a challenge to organizations. In EC-Council&#8217;s latest whitepaper titled &#8220;Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices,&#8221; authored by Graham Thomson, CISO at Irwin Mitchell, we delve into some of the most&hellip;<\/p>\n","protected":false},"author":76,"featured_media":80017,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12228],"tags":[199,12429,439,12533],"class_list":{"0":"post-80014","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-whitepaper","8":"tag-cybersecurity","9":"tag-cybersecurity-whitepaper","10":"tag-phishing","11":"tag-security-awareness"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing Outlook 2023: Stats, Incidents &amp; Defense Tips<\/title>\n<meta name=\"description\" content=\"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what&#039;s happening now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Outlook 2023: Stats, Incidents &amp; Defense Tips\" \/>\n<meta property=\"og:description\" content=\"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what&#039;s happening now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-17T09:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T20:56:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Graham Thomson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Phishing Outlook 2023: Stats, Incidents &amp; Defense Tips\" \/>\n<meta name=\"twitter:description\" content=\"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what&#039;s happening now.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Thomson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/\"},\"author\":{\"name\":\"Graham Thomson\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/b91184a2002729f34863becf49d06b84\"},\"headline\":\"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices\",\"datePublished\":\"2023-08-17T09:50:00+00:00\",\"dateModified\":\"2026-03-11T20:56:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/\"},\"wordCount\":346,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Phishing-outlook-thumbnail.jpg\",\"keywords\":[\"cybersecurity\",\"Cybersecurity Whitepaper\",\"phishing\",\"security awareness\"],\"articleSection\":[\"Whitepaper\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/\",\"name\":\"Phishing Outlook 2023: Stats, Incidents & Defense Tips\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Phishing-outlook-thumbnail.jpg\",\"datePublished\":\"2023-08-17T09:50:00+00:00\",\"dateModified\":\"2026-03-11T20:56:28+00:00\",\"description\":\"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what's happening now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Phishing-outlook-thumbnail.jpg\",\"contentUrl\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/Phishing-outlook-thumbnail.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/whitepaper\\\/phishing-outlook-2023-statistics-and-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Whitepaper\",\"item\":\"https:\\\/\\\/test1.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/whitepaper\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/b91184a2002729f34863becf49d06b84\",\"name\":\"Graham Thomson\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Outlook 2023: Stats, Incidents & Defense Tips","description":"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what's happening now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Outlook 2023: Stats, Incidents & Defense Tips","og_description":"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what's happening now.","og_url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-08-17T09:50:00+00:00","article_modified_time":"2026-03-11T20:56:28+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg","type":"image\/jpeg"}],"author":"Graham Thomson","twitter_card":"summary_large_image","twitter_title":"Phishing Outlook 2023: Stats, Incidents & Defense Tips","twitter_description":"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what's happening now.","twitter_misc":{"Written by":"Graham Thomson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#article","isPartOf":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/"},"author":{"name":"Graham Thomson","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/b91184a2002729f34863becf49d06b84"},"headline":"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices","datePublished":"2023-08-17T09:50:00+00:00","dateModified":"2026-03-11T20:56:28+00:00","mainEntityOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/"},"wordCount":346,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg","keywords":["cybersecurity","Cybersecurity Whitepaper","phishing","security awareness"],"articleSection":["Whitepaper"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/","name":"Phishing Outlook 2023: Stats, Incidents & Defense Tips","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg","datePublished":"2023-08-17T09:50:00+00:00","dateModified":"2026-03-11T20:56:28+00:00","description":"The phishing landscape is evolving, and attackers are getting sophisticated in crafting highly personalized email campaigns. Find out what's happening now.","breadcrumb":{"@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#primaryimage","url":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg","contentUrl":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/08\/Phishing-outlook-thumbnail.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/whitepaper\/phishing-outlook-2023-statistics-and-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/test1.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Whitepaper","item":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/category\/whitepaper\/"},{"@type":"ListItem","position":4,"name":"Phishing Outlook 2023: Statistics, Real-Life Incidents, and Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/b91184a2002729f34863becf49d06b84","name":"Graham Thomson"}]}},"_links":{"self":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=80014"}],"version-history":[{"count":0,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/80014\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/80017"}],"wp:attachment":[{"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=80014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=80014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/test1.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=80014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}