Phishing is the most common way attackers gain access to business systems. It doesn't require sophisticated technical skills — just a convincing email and one distracted staff member. For a busy dental or medical practice, that's a realistic risk every single day.
The good news is that most phishing emails have recognisable patterns. Once you know what to look for, you catch them before they cause damage.
A phishing email is a fake message designed to trick you into doing one of three things:
The emails often look like they come from trusted sources — Microsoft, the ATO, Medicare, a supplier, or even a colleague.
The display name might say "Microsoft Support" but the actual email address is something like support@microsft-helpdesk.com. Always check the actual address, not just the name shown in your inbox. Attackers rely on the fact that most people don't look past the display name.
Phishing emails frequently use urgency to short-circuit your judgement. Phrases like "Your account will be suspended in 24 hours", "Immediate action required", or "Final notice" are designed to make you act before you think. A legitimate organisation rarely needs you to do something in the next hour.
If you weren't expecting a document, invoice, or login request, be suspicious. Hover over any link before clicking — the URL shown in the bottom of your browser should match what you'd expect. A link claiming to go to myaccount.microsoft.com but actually pointing to ms-login.support-portal.net is not Microsoft.
Legitimate services you use know your name. "Dear Customer", "Dear User", or no greeting at all are signs the email wasn't sent specifically to you — it was blasted to thousands of addresses.
Many phishing emails originate overseas and contain subtle grammar errors, odd punctuation, or phrasing that doesn't quite sound right. This has become less reliable as attackers increasingly use AI to write convincing text — but it's still a useful signal.
Microsoft, your bank, Medicare, or any legitimate organisation will never ask you to confirm your password by clicking a link. If someone is asking for login details or a bank transfer via email, treat it as a red flag regardless of how convincing it looks.
Real example: A practice manager received an email appearing to be from their practice principal asking her to urgently transfer $4,200 to a supplier. The email looked legitimate — same name, professional tone. But the actual email address was slightly different. A quick phone call to the principal (who was in a patient session) confirmed it was a scam. The call took 30 seconds. The transfer would have been irreversible.
If a team member clicked a link and entered their credentials, act quickly:
Technical controls help, but your staff are the last line of defence against phishing. Regular training — even just a quick monthly reminder of what to look for — significantly reduces the chance of a successful attack. Practices that run simulated phishing tests consistently see improvement in staff awareness over time.
We run simulated phishing tests and security training for Australian dental and medical practices. Book a free security audit to find out where you stand.
Book your free audit