We discuss what a phishing email is, go over some of the most commonly used techniques, and explain what to do if you suspect a phishing attack.| Check Point Software