Quishing, Vishing, Smishing & Phishing – What’s the Difference (and Why It Matters to Your Business)?

How Cyber Criminals Use Multi-Channel Social Engineering Attacks

Cyber criminals don’t rely on one tactic anymore. They use multiple channels to trick your people – email, phone calls, text messages, even QR codes.

These attacks all fall under the same umbrella: social engineering – manipulating people into giving away access, money, or sensitive data.

Understanding the differences is critical because modern attacks rarely use just one method. A phishing email might be followed by a vishing call. A smishing text may direct someone to scan a QR code.

For SMEs, the risk isn’t theoretical. One click can mean:

  • Business email compromise

  • Stolen Microsoft 365 credentials

  • Ransomware deployment

  • Data breach and regulatory exposure

  • Cyber insurance claims being declined

Let’s break them down in plain English.


 Phishing (Email-Based Attacks)

https://www.terranovasecurity.com/sites/default/files/migration/BEC-phishlabs.jpg

What is a Fradulent Email?

A fraudulent email designed to trick you into clicking a link, opening an attachment, or entering login details.

Common examples:

  • “Your Microsoft 365 password expires today”

  • Fake invoice from a supplier

  • CEO asking for urgent payment

  • Fake SharePoint document share

How it impacts your business:

  • Attackers gain mailbox access

  • They monitor conversations silently

  • They send fake payment requests to clients

  • They escalate privileges and deploy malware

This is still the number one entry point for cyber breaches.


Smishing (SMS/Text Message Attacks)

https://images.openai.com/static-rsc-3/dvXQjBOM2hnkM3HxoIrPmyi8zPJn1mDBPjwDOhaUgbi_7VFx4z5-Y5bm-cyrD8zxQYPlOyxHQAftwjLYJP3xxDBAf8HDMMdq_Z6aEoDCYPQ?purpose=fullsize&v=1

What is a Smishing (SMS/Text Message Attack)?

Phishing via text message (SMS).

Common examples:

  • “Royal Mail: missed delivery – click here”

  • “Unusual bank activity detected”

  • “Voicemail waiting – listen now”

Because texts feel immediate and personal, people are more likely to click without thinking.

Business risk:

  • Staff entering credentials on fake login pages

  • MFA fatigue attacks triggered

  • Corporate mobile devices compromised

  • Personal phone breaches leading to business exposure

With hybrid working, mobile is now a primary attack surface.


Vishing (Voice Call Attacks)

What Is Vishing (Voice Call Attacks)?

Fraud via phone call often impersonating IT support, a bank, HMRC, or even your own supplier.

Common tactics:

  • “We’re from Microsoft – your account is compromised”

  • “We need you to approve this urgent payment”

  • “Your CEO has authorised this transfer”

Modern vishing is sophisticated. Criminal groups operate like professional call centres. AI voice cloning is increasingly used to impersonate senior leaders.

Business risk:

  • Direct financial fraud

  • Payment diversion

  • MFA code harvesting

  • Remote access granted to attackers

One convincing call can override months of good security.


Quishing (QR Code Phishing)

QR code phishing attack symbol with a smartphone scanning a fake qr code and two hackers

What is Quishing?

Phishing delivered via QR code.

Instead of clicking a suspicious link, the victim scans a QR code that leads to a fake login page.

Where it appears:

  • Parking meters

  • Restaurant tables

  • Posters

  • Fake invoices

  • Email attachments with QR codes

Because QR codes hide the destination URL, they bypass the natural “hover and check” instinct.

Business risk:

  • Credential theft

  • MFA session hijacking

  • Malware download

  • Compromised corporate devices

QR-based attacks are rising because email filters often miss them.


Why This Matters for SMEs

Attackers no longer “hack systems” first.

They hack people.

Most breaches in SMEs start with:

  1. Stolen credentials

  2. Weak MFA

  3. Poor verification of payment changes

  4. Lack of staff awareness

Once inside Microsoft 365 or your email platform, criminals can move laterally, access SharePoint, OneDrive, financial systems, and backup portals.

The financial impact isn’t just ransom. It includes:

  • Downtime

  • Reputational damage

  • Regulatory investigation

  • Increased cyber insurance premiums

  • Claims denied due to misrepresented controls


What To Do If You Think You’ve Been Caught Out

If you’ve clicked, scanned, replied or approved something suspicious – speed matters more than embarrassment.

Step 1: Tell your IT Team Immediately

Do not try to fix it quietly. The faster it’s reported, the more likely the damage can be contained.

Step 2: Disconnect (If Advised)

If instructed, disconnect from Wi-Fi or unplug network cable.

Step 3: Change Passwords

From a secure device:

  • Change your Microsoft 365 password

  • Sign out of all sessions

  • Reset MFA if needed

Step 4: Check Bank & Payment Activity

If money or supplier details were involved:

  • Call your bank immediately

  • Contact affected suppliers or clients

Step 5: Preserve Evidence

Do not delete:

  • Emails

  • Text messages

  • Call logs

  • QR codes

These are vital for forensic investigation and insurance.


Prevention: What Actually Reduces Risk

Technology alone isn’t enough. Protection needs layers:

  • Advanced email filtering

  • Multi-Factor Authentication with proper configuration

  • Security Awareness Training (micro-learning works best)

  • Conditional access policies

  • 24/7 monitoring and threat response

  • Clear payment verification procedures

  • Incident response plan tested in advance

The goal isn’t 100% prevention.
It’s rapid detection and containment before damage spreads.

If your team doesn’t clearly understand the difference between phishing, smishing, vishing and quishing, attackers already have an advantage.

Cyber security isn’t about fear.

It’s about awareness, preparation and layered defence.

Because in today’s environment, the question isn’t:

“Will someone try?”

It’s:

“How quickly will we spot it — and how well are we prepared to respond?”

Our Security Awareness Training programmes cover these sorts of topics and frequent, ongoing training to educate your business is now becoming a requirement for Cyber Essentials and cyber insurance.

Cyber Security Awareness Training (SAT) – Call 0800 368 7730

    Insider Threat Cyber Security: The Business Risk Many SMEs Overlook Latest

    Insider Threat Cyber Security: The Business Risk Many SMEs Overlook

    Read more Microsoft 365 Business Premium – Are You Signed Up to Stay Secure? Latest

    Microsoft 365 Business Premium – Are You Signed Up to Stay Secure?

    Read more Cyber Essentials – Are You Ready, Or at Risk? Latest

    Cyber Essentials – Are You Ready, Or at Risk?

    Read more
Contact Us

For more information contact us...

    If you need responsive and reliable IT solutions that are tailored to your business, then contact the experts at AMP. Our skilled engineers provide outstanding IT support and technical expertise you can depend on.