How to Spot a Phishing Email Before It Costs Your Business Thousands
by Jon Lober | NOC Technology
Your employees are going to receive a phishing email this week.
That's not a scare tactic. It's a statistical probability. The FBI's Internet Crime Complaint Center reported over $2.7 billion in losses from business email compromise in their annual report released in April 2025— and those are just the cases that got reported.
The emails are getting better, too. The days of "Nigerian prince" scams with broken English are long gone. Today's phishing emails look like invoice approvals from your accounting software, shared documents from a colleague's OneDrive, or password reset notices from Microsoft. They use your company's name. They reference real projects. And they land in inboxes at businesses in Chesterfield, MO just as often as they land anywhere else.
Here's the thing: most of these attacks don't succeed because of some sophisticated hack. They succeed because a busy person clicked a link without thinking twice. And that's actually good news, because it means the fix is education, not just technology.
What Phishing Actually Looks Like in 2026
Forget what you think you know about spam. Modern phishing falls into a few categories that every employee should recognize:
Business Email Compromise (BEC)
An email that appears to come from your CEO, CFO, or a vendor asking for a wire transfer, gift card purchase, or updated payment information. These often target accounting staff and office managers. The email address might be off by one character, or the attacker may have actually compromised someone's real account.
Credential harvesting
A fake login page for Microsoft 365, Google Workspace, your bank, or your industry-specific software. You click a link, see a login screen that looks exactly right, enter your password, and now someone else has it. These pages are often hosted on legitimate-looking domains and even have valid SSL certificates.
Malware delivery
An attachment or link that installs ransomware or a remote access tool on your computer. These often pose as invoices, shipping notifications, or shared documents. The file might be a PDF, a Word document with macros, or a ZIP file containing an executable.
Conversation hijacking
An attacker compromises one email account and then jumps into existing email threads with other people. Because the conversation is real and ongoing, the recipient has no reason to suspect the new message is malicious. This is one of the hardest types to detect because the context is legitimate.
The Red Flags That Give Phishing Away
No single indicator means an email is definitely phishing, but a combination of these should make anyone pause:
Urgency that doesn't make sense.
"Your account will be locked in 2 hours." "This invoice is past due and we're escalating to legal." "The CEO needs this handled before the board meeting today." Real business communications occasionally have deadlines, but phishing emails almost always manufacture false urgency to short-circuit your judgment.
The sender address doesn't match.
The display name might say "Microsoft 365 Support" but the actual email address is support@m1crosoft-alerts.com. Always check the full email address, not just the name. On mobile devices, you often need to tap the sender name to reveal the actual address.
Links that don't go where they claim.
Hover over any link before clicking it. If the text says "Sign in to Microsoft 365" but the URL points to something like login-microsoftonline.security-update.com, that's not Microsoft. On mobile, press and hold the link to preview the URL.
Unexpected attachments.
If you weren't expecting a document from this person, don't open it. Call them and ask. It takes 30 seconds and could save you weeks of recovery.
Something just feels off.
The tone isn't right. Your vendor doesn't usually email at 2 AM. The formatting is slightly different than normal. Trust that instinct. It's better to verify a legitimate email than to click a malicious one.
Why Training Matters More Than Filters
Email security tools are essential. Multilayered cybersecurity should include spam filtering, link scanning, attachment sandboxing, and domain-based authentication like SPF, DKIM, and DMARC. These tools catch the majority of phishing attempts before they ever reach an inbox.
But "the majority" isn't "all of them." The emails that make it through the filters are the good ones. The ones that look right, come from legitimate-looking domains, and don't trigger any automated red flags. Those are the emails your team needs to be trained to recognize.
Security awareness training isn't a one-time event. It's an ongoing practice. The businesses in the greater St. Louis area that handle this well typically do a few things consistently:
Simulated phishing tests.
Send realistic fake phishing emails to your own team. Not to punish people who click, but to identify who needs more training and to keep awareness high. When employees know they might be tested, they look at every email a little more carefully.
Short, regular training modules.
Five to ten minutes per month is more effective than a two-hour annual session that everyone forgets by the following week. Focus on real examples, not abstract concepts.
A clear reporting process.
Make it easy for employees to report suspicious emails. A dedicated button in Outlook, a specific email address to forward to, or a quick Slack/Teams message to IT. If reporting feels complicated, people won't do it. If they feel like they'll be judged for false alarms, they won't do it either.
Leadership participation.
If the CEO and management team skip training, everyone else takes the cue that it's not important. The most effective programs have leadership going through the same simulations as everyone else.
What to Do When Someone Clicks
It's going to happen. Someone on your team will eventually click a phishing link or open a suspicious attachment. The speed and quality of your response determines whether it's a minor incident or a major breach.
Step 1: Don't panic, but act fast.
Have the employee disconnect from the network (unplug ethernet or turn off Wi-Fi) and contact IT immediately. The faster you isolate the affected machine, the less time an attacker has to move laterally through your network.
Step 2: Change credentials.
If they entered a password on a fake login page, change that password immediately. If they use the same password anywhere else (which they shouldn't, but often do), change those too. Enable multi-factor authentication on the compromised account if it wasn't already in place.
Step 3: Investigate scope.
Did the compromised account send any emails to other people? Were any files accessed or downloaded? Is there any evidence of the attacker moving to other systems? This is where having proper managed IT support matters, because your IT team should have monitoring tools that can answer these questions quickly.
Step 4: Document and learn.
What made this phishing email convincing enough to fool someone? Use it as a training example (anonymized, of course) for the rest of the team. Every incident is an opportunity to make the next one less likely.
Having a written incident response plan before something happens is what separates businesses that recover cleanly from businesses that scramble. If you don't have one, that's the single most important thing you can do after reading this.
The Business Case for Security Awareness
For businesses in Chesterfield and the surrounding communities, from the retail and restaurant operations along Clarkson Road to the professional services firms in Chesterfield Village, the math on security training is straightforward.
A decent security awareness training platform costs $3 to $8 per employee per month. A single successful phishing attack that leads to a wire transfer scam typically costs $50,000 to $250,000. A ransomware incident can cost multiples of that when you factor in downtime, recovery, potential data loss, and reputational damage.
The return on investment isn't theoretical. It's one of the clearest cost-benefit calculations in all of business IT.
And it's not just about the money. If your business handles sensitive data (client financials, patient records, legal documents, proprietary designs), a breach creates compliance issues, notification obligations, and potential legal liability. For businesses subject to CMMC , HIPAA, or other frameworks, security awareness training isn't optional. It's a documented requirement.
Getting Started
You don't need to overhaul everything at once. Start with three things:
1. Turn on multi-factor authentication for every account. Every single one. This alone stops the majority of credential-based attacks even when someone falls for a phishing email.
2. Set up simulated phishing tests. Most managed IT providers can deploy these through platforms like KnowBe4, Proofpoint, or Huntress SAT. They're low-effort to administer and high-impact.
3. Create a one-page incident response checklist. What do employees do if they think they clicked something bad? Who do they call? What steps does IT take? Print it out and post it somewhere visible.
If you want help evaluating where your business stands on phishing readiness, or you want to talk through what a security awareness program looks like for a company your size, reach out for a conversation . We work with businesses throughout the Chesterfield, West County, and greater St. Louis area, and we've seen the full range from "we've never thought about this" to "we have a program but it's not working." Both are fine starting points.
NOC Technology provides cybersecurity services and managed IT support from our office in Washington, MO. We serve businesses across the St. Louis metro area, including Chesterfield, Wildwood, Ballwin, Ellisville, and surrounding communities. Call us at 636.390.6621 or visit noctechnology.com.



