{"id":15067,"date":"2024-08-02T13:38:31","date_gmt":"2024-08-02T13:38:31","guid":{"rendered":"https:\/\/trustpair.com\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/"},"modified":"2025-07-22T09:43:28","modified_gmt":"2025-07-22T09:43:28","slug":"what-is-vishing-and-how-can-you-protect-your-company-against-it","status":"publish","type":"post","link":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/","title":{"rendered":"What is vishing and how can you protect your company against it?"},"content":{"rendered":"<p>A 15% rise in vishing scams between 2021 and 2022 has led to stark losses of over $39.5 billion for Americans in the most recent calendar year. <strong>The growth of this fraud threatens businesses all over the country<\/strong> in a financial and reputational nature.<\/p>\n<p>Worse still, is that there are many fraud detection and prevention techniques to stop fraudsters &#8211; they\u2019re just not being implemented effectively. This piece will detail the steps to take, and how you can<strong> block any effect of vishing<\/strong> <strong>and other types of fraud<\/strong> by continuously controlling payments to any suspicious or unknown third party before they\u2019re executed, with Trustpair.<\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-node hs-cta-f87ea066-7298-4ae0-bcd1-f309efec12d5\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5\"><img decoding=\"async\" id=\"hs-cta-img-f87ea066-7298-4ae0-bcd1-f309efec12d5\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/f87ea066-7298-4ae0-bcd1-f309efec12d5.png\" alt=\"Nouveau call-to-action\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, 'f87ea066-7298-4ae0-bcd1-f309efec12d5', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>What is vishing?<\/h2>\n<p><strong>Vishing stands for voice phishing.<\/strong> Let\u2019s break it down:<\/p>\n<p>Phishing, the umbrella term for this type of fraud, refers to a social engineering attack. Criminals impersonate genuine sources, like suppliers or agencies to extract funds or sensitive information. <a href=\"https:\/\/trustpair.com\/gb\/blog\/the-7-ways-to-recognize-phishing-and-avoid-it\/\">Phishing<\/a> can be perpetrated through scam emails or text messages (smishing), but today we\u2019re focusing on voice phishing.<\/p>\n<p>Voice phishing, therefore, describes someone pretending to be a reputable organization over the phone.<\/p>\n<p>It can occur with a real person on the other end of the line, but <a href=\"https:\/\/tclr.se\/US2022Report\">61.1% of successful attacks actually happened with robocallers last year<\/a>. It\u2019s clear that even automated messaging emerges as a threat to organizations and their operational resilience, making it even more important for firms to fight back.<\/p>\n<h2>How does it work?<\/h2>\n<p>Here\u2019s how voice phishing works:<\/p>\n<ol>\n<li>Social engineering<\/li>\n<li>High-volume attacks<\/li>\n<li>Targeted information<\/li>\n<\/ol>\n<p><strong>Vishing works because it relies on social engineering<\/strong>. The entire scam hinges on putting pressure on the employee being targeted, not allowing this individual to \u201cthink straight\u201d or consider more rational possibilities. Often, this means that attackers will use deadlines or time-sensitive language to extract the information they need.<\/p>\n<p>Moreover, although telephones are viewed as more secure than email, for example, the average American still receives more than <a href=\"https:\/\/time2play.com\/blog\/spam-and-scam-calls\/\">three spam calls each day<\/a>. With such a high volume and no automated capability to block unknown callers, it\u2019s inevitable that at least one attempt is likely to be successful. Fraudsters taking the \u201cspray and pray\u201d attempt rely on this for vishing to work.<\/p>\n<p>Finally, <strong>targeted voice phishing attempts use specific company or employee information to gain trust<\/strong>. For example, the fraudsters might <a href=\"https:\/\/trustpair.com\/gb\/vendor-fraud-prevention\/\">impersonate a known vendor<\/a> and call up about payment for a real invoice that they have intercepted, but ask to change the payment account to their own. If companies fail to verify the new account details and match them to those on record, it\u2019s likely that the payment will fall into the hands of the perpetrators.<\/p>\n<h3>Real-life example of vishing<\/h3>\n<p>In 2019, a successful vishing attempt on an anonymous British energy company led to losses of over $243,000, in under an hour after the phone call itself.<\/p>\n<p>A CEO was phoned by his apparent boss, the chief executive at a parent company in Germany, asking for the urgent transfer of funds to a \u201cHungarian supplier\u201d. Little did the CEO realize that the voice on the other end of the line was actually a deep fake; an AI concoction that mimicked the real boss\u2019 speech patterns. By applying social engineering pressure tactics, the CEO was convinced and transferred the amount straight into the account of the scammer.<\/p>\n<p>One of the reasons why this example of fraud was successful is the fact that it was <strong>targeted voice phishing<\/strong>. The fraudsters knew exactly who the cardholder was, and who had the authority to pay. Moreover, detecting deep fakes is incredibly difficult to do over the phone. But, with an automatic account verification system in place, the payment would have been ruled suspicious and blocked, overriding the authority of the CEO.<\/p>\n<h2>What are the main vishing scams?<\/h2>\n<p>All vishing scams begin the same way, with the phone ringing and an employee answering.<\/p>\n<p>Then, the fraudsters are likely to <a href=\"https:\/\/trustpair.com\/gb\/blog\/third-party-fraud-how-to-fight-back-in-your-business\/\">impersonate one of these third parties:<\/a><\/p>\n<ol>\n<li>Tax office<\/li>\n<li>Bank<\/li>\n<li>Supplier (invoice fraud)<\/li>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/ceo-fraud-how-to-protect-your-organization-from-fraudsters\/\">CEO (CEO fraud)<\/a><\/li>\n<li>Software Company<\/li>\n<\/ol>\n<h3>Tax office impersonation<\/h3>\n<p>At a business level, the IRS can be one of the most feared organizations to interact with. This means that there can be a tendency to blindly follow requests when they come in.<\/p>\n<p><strong>Tax office impersonation relies on high-pressure tactics,<\/strong> including encouraging the victim to act fast to avoid adverse consequences. Since there have been many high-profile tax evasion cases, with consequences like imprisonment and fines, employees can feel the stress.<\/p>\n<p>Often, tax impersonators may know sensitive information about your business gained from other hacks and scams. It\u2019s important to only give information when you call the tax office, and not when an unknown number calls you.<\/p>\n<h3>Bank account compromise<\/h3>\n<p>Contact from <strong>false representatives of the bank<\/strong> can also try to initiate payments without cause. By appearing as a reputable company, with trust and history already built, it\u2019s fairly common for banking impersonators to dupe company employees.<\/p>\n<p>In fact, in 2022, <a href=\"https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2023\/06\/new-ftc-data-analysis-shows-bank-impersonation-most-reported-text-message-scam\">over $330 million was lost due to banking scams over the phone<\/a>. Again, with this type of voice phishing, the fraudsters are likely to come in knowing details about your business to appear more legitimate. It\u2019s important to verify the identity of the caller and refuse the pressure of suspicious payment requests.<\/p>\n<h3>Invoice fraud<\/h3>\n<p>Invoice fraud could be <strong>one of the most common types of vishing<\/strong>; as IT security firm Quostar knows all too well. In 2019, one of the executives received a phone call from an alleged supplier, asking to be put through to the CEO to make a payment on account. The supplier was known to the company, but the caller wasn\u2019t their usual contact.<\/p>\n<p>Thankfully, the CEO was unavailable at the time and since he was the cardholder on this supplier\u2019s account, the fraudster simply asked for a callback. With specific details about the CEO and the supplier, this fraud attempt was particularly alarming.<\/p>\n<p>Quostar executives later found out that the true supplier had suffered from a data breach in the days prior, which is why the criminals had access to their credentials. Without a proper <a href=\"https:\/\/trustpair.com\/gb\/blog\/how-to-implement-effective-fraud-detection-and-prevention-measures\/\">fraud detection or prevention process<\/a> in place though, this likely would have resulted in a successful fraud attempt if the CEO was available.<\/p>\n<h3>CEO fraud<\/h3>\n<p>Similar to the above example, <strong>vishing attempts can be perpetrated by impersonating the CEO.<\/strong> Here, criminals take advantage of highly advanced techniques like voice imitation software to perfectly mimic the voice patterns of CEOs or senior executives.<\/p>\n<p>By applying AI to their robocalls, the fraudsters can adapt to whatever their victim says, making the entire scam more realistic. Although CEO fraud typically happens through standard phishing over email, telephone perpetrators are a growing concern.<\/p>\n<p>This is a particularly successful method thanks to the realistic impersonation and manipulation of the company hierarchy. Any fraud detection and prevention methods must therefore take this into consideration in order to be effective.<\/p>\n<h3>Software company impersonation<\/h3>\n<p>In a similar fashion to supplier, CEO, bank, and tax office impersonation, <strong>fraudsters may also try to gain access to your sensitive information through your IT systems<\/strong>. And if employees aren\u2019t in the know, they may well approve external access, ransomware or malware upload to the company systems based on a convincing phone call.<\/p>\n<p>Also known as remote access scams, fraudsters on the other end often guide employees to click through on their laptops or desktop computers, granting them access to the system. From there, it\u2019s easy for scammers to lock the company out of their own systems, and either get hold of sensitive proprietary information or make transfers directly.<\/p>\n<p>Learn all there is to know about <a href=\"https:\/\/trustpair.com\/gb\/resources\/2025-uk-fraud-trends-and-insights\/\">B2B fraud in our latest fraud report.<\/a><\/p>\n<p><!--HubSpot Call-to-Action Code --><span id=\"hs-cta-wrapper-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-wrapper\"><span id=\"hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-node hs-cta-26e69232-c009-4130-a9a9-c5b1c44d4013\"><!-- [if lte IE 8]>\n\n\n<div id=\"hs-cta-ie-element\"><\/div>\n\n\n<![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013\"><img decoding=\"async\" id=\"hs-cta-img-26e69232-c009-4130-a9a9-c5b1c44d4013\" class=\"hs-cta-img\" style=\"border-width: 0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5278241\/26e69232-c009-4130-a9a9-c5b1c44d4013.png\" alt=\"fraud study us\" \/><\/a><\/span><script charset=\"utf-8\" src=\"https:\/\/js.hscta.net\/cta\/current.js\"><\/script><script type=\"text\/javascript\"> hbspt.cta.load(5278241, '26e69232-c009-4130-a9a9-c5b1c44d4013', {\"useNewLoader\":\"true\",\"region\":\"na1\"}); <\/script><\/span><!-- end HubSpot Call-to-Action Code --><\/p>\n<h2>How can you spot this type of scam?<\/h2>\n<p>The best approach towards vishing fraud detection includes:<\/p>\n<ul>\n<li><a href=\"https:\/\/trustpair.com\/gb\/blog\/fraud-awareness-and-prevention-policies-safeguard-against-deceptive-practices\/\">Fraud awareness training<\/a><\/li>\n<li>Suspicious activity detection<\/li>\n<\/ul>\n<h3>Fraud awareness training<\/h3>\n<p>It is recommended that all <strong>employees attend regular fraud awareness training in order to spot the signs of vishing attacks.<\/strong> These training sessions can ensure that your people know what to look for, and how to fight back.<\/p>\n<p>Events held every 3-4 months should help inform your team members of new and emerging trends within the fraud space. The contents of the training also matter though. As a benchmark, approximately 91% of companies cover \u201cred flags\u201d, but only 31% include scenarios from real life.<\/p>\n<p>Structuring the sessions with genuine examples could make the training more impactful for your colleagues. It&#8217;s also more likely to resemble what they\u2019d encounter at work.<\/p>\n<h3>Suspicious activity detection<\/h3>\n<p>Suspicious activity relies less on your team members, and more on the systems at play. When trying to determine if an action (like a payment) is an anomaly, computer-led statistical analysis is likely to be your best friend.<\/p>\n<p>For example, at Trustpair, we use pattern recognition calculations and machine learning to understand the \u201cnormal\u201d behavior of merchants and vendors. When something goes out of the \u201cnormal range\u201d,<strong> we flag it and automatically block any pending transactions<\/strong>. So when a fraudster tries to steal your funds, they can\u2019t manipulate the system.<\/p>\n<p>By working with online platforms to detect suspicious activity, your team doesn\u2019t only get the benefit of working around-the-clock, but by reacting in real-time too.<\/p>\n<h2>How can you prevent vishing?<\/h2>\n<p>The best way to prevent voice phishing is by <strong>verifying unknown callers, maintaining suspicion<\/strong> even when the caller knows details about the company, and never providing personal information.<\/p>\n<p>But we\u2019re all human. That\u2019s why <a href=\"https:\/\/trustpair.com\/gb\/fraud-prevention-software\/\">having a fraud prevention solution like Trustpair<\/a> acts as a failsafe. By blocking payments to suspicious accounts and bypassing approval hierarchies, we can protect your company\u2019s funds from falling into the wrong hands. <a href=\"https:\/\/trustpair.com\/gb\/demo-5\/\">Contact an expert right away!<\/a><\/p>\n<p><em>To conclude&#8230;<\/em><\/p>\n<p>Vishing <strong>stands for voice phishing and is a type of scam resulting from impersonation callers.<\/strong> Protect your company against vishing by training employees to be suspicious, verify callers and implement anti-fraud software like Trustpair.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A 15% rise in vishing scams between 2021 and 2022 has led to stark losses of over $39.5 billion for Americans in the most recent calendar year. The growth of this fraud threatens businesses all over the country in a financial and reputational nature. Worse still, is that there are many fraud detection and prevention [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":15068,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[117],"tags":[],"class_list":["post-15067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fraud-protection-gb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect your company against vishing - Trustpair<\/title>\n<meta name=\"description\" content=\"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect your company against vishing - Trustpair\" \/>\n<meta property=\"og:description\" content=\"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Trustpair\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-02T13:38:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-22T09:43:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"593\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"trustpair_2438\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"trustpair_2438\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\"},\"author\":{\"name\":\"trustpair_2438\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\"},\"headline\":\"What is vishing and how can you protect your company against it?\",\"datePublished\":\"2024-08-02T13:38:31+00:00\",\"dateModified\":\"2025-07-22T09:43:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\"},\"wordCount\":1647,\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg\",\"articleSection\":[\"Fraud protection\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\",\"url\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\",\"name\":\"Protect your company against vishing - Trustpair\",\"isPartOf\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg\",\"datePublished\":\"2024-08-02T13:38:31+00:00\",\"dateModified\":\"2025-07-22T09:43:28+00:00\",\"description\":\"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?\",\"breadcrumb\":{\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg\",\"width\":1200,\"height\":593},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/trustpair.com\/gb\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is vishing and how can you protect your company against it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trustpair.com\/gb\/#website\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"name\":\"Trustpair\",\"description\":\"Leading Payment Fraud Prevention Platform\",\"publisher\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trustpair.com\/gb\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/trustpair.com\/gb\/#organization\",\"name\":\"Trustpair\",\"url\":\"https:\/\/trustpair.com\/gb\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"contentUrl\":\"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg\",\"width\":304,\"height\":73,\"caption\":\"Trustpair\"},\"image\":{\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034\",\"name\":\"trustpair_2438\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g\",\"caption\":\"trustpair_2438\"},\"sameAs\":[\"http:\/\/trustpair.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect your company against vishing - Trustpair","description":"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/","og_locale":"en_GB","og_type":"article","og_title":"Protect your company against vishing - Trustpair","og_description":"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?","og_url":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/","og_site_name":"Trustpair","article_published_time":"2024-08-02T13:38:31+00:00","article_modified_time":"2025-07-22T09:43:28+00:00","og_image":[{"width":1200,"height":593,"url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg","type":"image\/jpeg"}],"author":"trustpair_2438","twitter_card":"summary_large_image","twitter_misc":{"Written by":"trustpair_2438","Estimated reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#article","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/"},"author":{"name":"trustpair_2438","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034"},"headline":"What is vishing and how can you protect your company against it?","datePublished":"2024-08-02T13:38:31+00:00","dateModified":"2025-07-22T09:43:28+00:00","mainEntityOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/"},"wordCount":1647,"publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg","articleSection":["Fraud protection"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/","url":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/","name":"Protect your company against vishing - Trustpair","isPartOf":{"@id":"https:\/\/trustpair.com\/gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage"},"image":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg","datePublished":"2024-08-02T13:38:31+00:00","dateModified":"2025-07-22T09:43:28+00:00","description":"Vishing is on the rise and can have a big impact on your business. What is it exactly and how can you set up efficient measures to block it?","breadcrumb":{"@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#primaryimage","url":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/Shutterstock_264466157.jpg","width":1200,"height":593},{"@type":"BreadcrumbList","@id":"https:\/\/trustpair.com\/gb\/blog\/what-is-vishing-and-how-can-you-protect-your-company-against-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/trustpair.com\/gb\/"},{"@type":"ListItem","position":2,"name":"What is vishing and how can you protect your company against it?"}]},{"@type":"WebSite","@id":"https:\/\/trustpair.com\/gb\/#website","url":"https:\/\/trustpair.com\/gb\/","name":"Trustpair","description":"Leading Payment Fraud Prevention Platform","publisher":{"@id":"https:\/\/trustpair.com\/gb\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustpair.com\/gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/trustpair.com\/gb\/#organization","name":"Trustpair","url":"https:\/\/trustpair.com\/gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/","url":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","contentUrl":"https:\/\/trustpair.com\/wp-content\/uploads\/2024\/07\/Logo-trustpair.svg","width":304,"height":73,"caption":"Trustpair"},"image":{"@id":"https:\/\/trustpair.com\/gb\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/trustpair.com\/gb\/#\/schema\/person\/84e7e0fdbda12c03dbbe6629de190034","name":"trustpair_2438","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d12c0ac7da84e4d35dc796d48c46b8b4220ca5f66a673f8913d561eaf8371db?s=96&d=mm&r=g","caption":"trustpair_2438"},"sameAs":["http:\/\/trustpair.com"]}]}},"_links":{"self":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/comments?post=15067"}],"version-history":[{"count":2,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15067\/revisions"}],"predecessor-version":[{"id":20444,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/posts\/15067\/revisions\/20444"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media\/15068"}],"wp:attachment":[{"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/media?parent=15067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/categories?post=15067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustpair.com\/gb\/wp-json\/wp\/v2\/tags?post=15067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}