From techrepublic.com
![email-data-phishing-with-cyber-thief-hide-behind-laptop-computer-vector-id1164097820-1.jpg](https://tr1.cbsistatic.com/hub/i/r/2020/10/08/5c0cad6b-f664-4e71-abe0-24760f86f757/resize/770x/d679de402a3a10ade3ce75ebab2ad959/email-data-phishing-with-cyber-thief-hide-behind-laptop-computer-vector-id1164097820-1.jpg)
Phishing attacks seem like a relatively simple tactic on the part of cybercriminals. Set up a phishing webpage, create your phishing email, send the email to targeted recipients, and then wait for those stolen account credentials and other compromised information to come your way.