Beware: Is that Microsoft... or a phishing attempt?
June 8, 2022
|
4
min read

Highlights
You can trust Microsoft, right? Well, what if it isn’t really Microsoft at all? Cyber criminals are impersonating the tech giant. Don’t fall for it…
Think twice before opening that email from “Microsoft”.
It’s easy to trust a message that looks like it’s from Microsoft. After all, it’s one of the world’s most recognised and respected tech brands.
But what if it’s not really from Microsoft at all?
Cyber criminals are increasingly impersonating trusted companies to trick people—and Microsoft is currently the most impersonated brand in phishing scams.
Recent research reveals that 36% of brand-related phishing attacks in early 2025 were disguised as Microsoft communications. That’s a staggering figure.
Google and Apple follow closely behind. Together, these three tech giants account for over half of all phishing attempts.
So, what’s going on—and more importantly, how can you protect your business?
What is phishing?
Phishing is when a scammer sends a fake email, text, or message that looks like it’s from a legitimate company you know and trust.
Their aim? To get you to click a link, download a malicious file, or hand over sensitive information—like passwords, card details, or even your full identity.
The consequences can be severe: stolen funds, compromised systems, leaked data—and a major headache for your business.
Phishing is getting smarter
Gone are the days of obvious spelling mistakes and dodgy-looking links. Today’s phishing emails are slick.
Scammers replicate logos, build convincing fake websites, and even spoof email addresses to make it look like the message is genuinely from Microsoft, Google, or Apple.
There’s also been a recent surge in attacks impersonating Mastercard—complete with fake websites designed to steal card details.
It’s a worrying trend, and it shows just how inventive cyber criminals are becoming.
How to spot a fake
The key is to slow down and stay alert.
Legitimate companies like Microsoft won’t pressure you with urgent messages like “Click now or lose access”. That kind of language is a major red flag.
Always inspect the sender’s email address carefully. It might look right at first glance, but a closer look could reveal subtle changes—like “micros0ft.com” instead of “microsoft.com”.
And never click on links in emails you’re unsure about. If in doubt, open your browser and type the official website address manually. It’s a safer route.
Stay protected
Being cautious might feel inconvenient—but it’s nothing compared to the fallout from a cyber attack.
Phishing scams are only going to get more convincing. That’s why it’s essential to:
- Stay vigilant
- Invest in robust cyber security tools
- Use smart protections like multi-factor authentication (requiring two forms of ID to log in)
Remember: the more trusted the brand, the bigger the target!
That email that looks like it’s from Microsoft? It could be a wolf in sheep’s clothing.
We’re here to help you and your team stay protected—and alert—to phishing threats. Let’s talk.
Tell us about yourself so we can serve you best.
Got a question?
More articles
.png)
This special edition of our Leading London series brings together the partners behind the rollout of the City of London Corporation’s new unified network, a major upgrade designed to strengthen public services and improve connectivity across the Square Mile and beyond.
The panel included:
- Sam Collins, Assistant Director of Digital and Data, City of London Corporation
- Chelsea Chamberlin, Chief Technology Officer, Roc Technologies
- Scott McKinnon, Chief Security Officer, Palo Alto Networks
- Rhod Morgan, Chief Operations Officer, Vorboss
- Elliot Townsend, Senior Director, Juniper Networks
- Christa Elizabeth Norton, Marketing Director, Roc Technologies
Together, they explored how the new network will improve public services, strengthen cyber resilience and support a more connected, future-ready City.

For many landlords and building managers, the word “wayleave” feels like the responsible route whenever a fibre circuit is being installed on their property. It sounds formal and safe – a neat legal box to tick.
In many cases, however, a wayleave adds unnecessary complexity and delays, frustrates tenants, and can expose landlords to long-term legal risks.
At Vorboss, we’ve connected thousands of office spaces across London without a wayleave, keeping landlords in full control and getting tenants online faster.

What is a wayleave?
A wayleave is a written agreement between a landowner and a telecoms operator. It gives the operator permission to install and keep equipment on private property.
What many people don’t realise is that signing a wayleave also activates “Code rights” under the Electronic Communications Code. These rights go beyond simple permission, they give the operator legal powers to stay on the property indefinitely, access it when needed, and even refuse removal of their equipment in certain situations.
For a typical connection into a commercial building in London, a wayleave can make the fibre installation process slower, more expensive, and limit the landlord’s flexibility long term.
Why a wayleave isn’t required for standard in-building fibre connections
For a standard in-building fibre connection serving a tenant, a wayleave isn’t a legal requirement. Important protections, like building access, fire safety, repairing any damage, and removing equipment, are already covered by the tenant’s lease and usual building rules.
If no wayleave is signed, no Code rights are triggered, meaning the landlord retains full control and the installation exists under a simple, fully revocable licence.
In practice, this gives landlords far more protection and flexibility:
- No legal lock-in – the telecoms operator has no long-term rights to stay or refuse removal.
- Landlords keep full control – equipment can be moved or removed when the building changes.
- Faster fibre installation – no time lost in drafting contracts or solicitor reviews.
- Happier tenants – connections go live quicker; tenants get to move in faster.
By contrast, signing a wayleave and granting Code rights introduces a complex and expensive legal process for any fibre removal or relocation. This can take at least 18 months, plus potential court or tribunal proceedings, making it slower, and far less flexible for the landlord.
.avif)

.avif)

