Beware: Is that Microsoft… or a phishing attempt? • Blisstech Solutions

When you get an email from Microsoft, you probably don’t think twice about opening it. Right?

After all, it’s Microsoft. One of the biggest, most trusted tech companies in the world.

But what if that email isn’t from Microsoft at all?

Cyber criminals love using trusted brands to trick people. And right now, Microsoft is the most impersonated company in the world when it comes to phishing scams.

In fact, new research shows that 36% of brand-related phishing attacks in early 2025 were pretending to be Microsoft.

That’s a huge number.

Google and Apple were next on the list. Together, the three tech giants made up more than half of all phishing scams.

So, what’s going on? And more importantly, how can you keep your business safe?

First, let’s quickly talk about what phishing is.

Phishing is when a criminal sends you a fake email, text, or message that looks like it’s from a real company. One you know and trust.

The goal is to get you to click on a link, open a malicious attachment, or hand over sensitive information like passwords, credit card numbers, or even your full identity.

Once that happens, the consequences can be nasty: Stolen money, hacked systems, confidential data leaks. And a world of pain for your business.

The worst part: Phishing emails are getting smarter. There’s a lot less bad spelling and suspicious-looking links.

Scammers copy real company logos. Set up fake websites that look exactly like the real thing. They even spoof email addresses so it looks like the message really is coming from Microsoft, Google, or Apple.

In fact, researchers recently found a rise in phishing attacks pretending to be Mastercard. Fake websites are tricking people into entering their card details.

It’s a worrying trend, and it shows that cyber criminals are constantly finding new ways to catch people out.

So, how can you tell if that email from Microsoft is the real deal, or a dangerous fake?

It’s all about slowing down and staying sharp.

Real emails from companies like Microsoft will never pressure you into urgent actions like “Click this link immediately or your account will be locked.” That kind of language is a big red flag.

Always check the sender’s email address carefully. At first glance it might look right, but a closer look could reveal slight changes. Like “micros0ft.com” instead of “microsoft.com”. Cyber criminals rely on you not noticing these small details.


And whatever you do, don’t click on links straight from an email you’re not sure about. If in doubt, go to your browser and type the official website address manually. It’s always safer that way.

Being cautious might feel like a hassle sometimes. But it’s nothing compared to the hassle of cleaning up after a cyber attack.

Phishing scams are only going to get more convincing. That’s why it’s vital to:

  • Stay alert
  • Invest in good cyber security tools
  • Use smart protections like multi-factor authentication (where you need two forms of ID to log in, not just a password)

Remember: The more trusted the brand, the bigger the target it becomes for scammers.
And that email that looks like it’s from Microsoft? It might just be a wolf in sheep’s clothing.

We can help you and your team stay better protected – and more vigilant – against phishing scams like these. Get in touch.

More Content

Are you ready for next-gen email security? (YES!)

Are you ready for next-gen email security? (YES!)

Sick of spam emails? We have details of a cool new tool to help keep us better protected.

Phishing – If you’re under pressure to take urgent action – stop and think

Phishing scams are one of the biggest security threats to your business right now and cybercriminals are always coming up with new phishing techniques. A massive 83% of organisations said they suffered successful attacks last year. And with just under a third of...
Security Awareness Training Thumbnail Image

Human Error: The Achilles’ Heel of Your Cybersecurity

Small and medium-sized businesses (SMBs) are prime targets for cyberattacks, and the most vulnerable element in their defence is their workforce. Effective cybersecurity awareness training is essential for every employee across your organisation. But to implement it...

Tech Tip: How to use Conditional Formatting in Excel

This Tuesday Two Minute Tech-tip shows you how to automatically add pizzaz to your spreadsheets. Using a feature called 'Conditional Formatting', you can automatically format the cells of your Excel spreadsheet based on what is in them. For example, you can emphasise...

Are your younger employees experiencing ‘tech shame’?

Gen Z and even some Millennial employees are less tech savvy than many employers might expect. It’s an assumption that’s leading to a sense of ‘tech shame’.

Tech Tip: How to align in objects in Microsoft PowerPoint

In today's Tuesday's Two Minute Tech Tip Matt shows you how to align objects in PowerPoint. It can be a pain when trying to align things manually in PowerPoint, but there is a handy little feature that makes this easy. This video will show you how to: 👉 How to quickly...

Tech Tip: How to use Windows shortcut keys

Good morning everyone and welcome to your Tuesday Two Minute Tech Tip. 👉 Tired of dragging the mouse around the screen to access the things you use all of the time? 👉 Want to hear about some handy shortcuts Windows that you never know existed? Today's tip will help...

Tech Tip: How to create a scheduling poll using Outlook

Welcome to a new Tuesday tech tip video where we will be exploring how to create a scheduling poll using Outlook. You know what it's like when you are trying to get everyone together for a meeting. Trying to find a time that suits everyone can be a real pain! There...
Microsoft: Criminals can access your accounts without your password

Microsoft: Criminals can access your accounts without your password

Just when you think you’ve got cyber security sorted for your business, a new scam comes along. This time, cyber criminals don’t even need to trick you out of your password to access your accounts… they can fool you with something called a “device code”.

Which ransomware payment option is best? (Hint: none)

Which ransomware payment option is best? (Hint: none)

Cyber criminals are giving you more options when it comes to paying your way out of a ransomware attack. Our advice remains the same though. Find out what that advice is here.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05