Business owner reviewing SaaS application permissions on laptop screen during security audit


In July 2025, attackers stole customer data from Google’s Salesforce instance without using a single line of malicious code. The breach affected over three dozen major companies, including Cisco, Adidas, and Chanel. The attack vector? A fake app that looked like a legitimate Salesforce tool. One employee clicked “Allow,” and the attackers walked away with valid API access tokens.

This type of attack, called consent phishing, targets the trust built into modern cloud applications. For small businesses learning how to implement automated phishing training, understanding this threat is just as important as defending against traditional email scams. Your team might spot a suspicious email, but would they question an authorization prompt from what appears to be a trusted vendor?

Why Consent Phishing Bypasses Traditional Security

Most security tools watch for malware, suspicious file downloads, and known bad websites. Consent phishing sidesteps all of these defenses. The attack happens inside legitimate platforms like Google Workspace, Microsoft 365, or Salesforce. The authorization flow is real. The tokens issued are valid. Nothing triggers your antivirus or firewall.

Small businesses face particular exposure here. Without dedicated IT staff monitoring application permissions, malicious apps can sit quietly in your environment for months. The Google breach wasn’t discovered until attackers sent extortion demands, weeks after the initial compromise.

The CISA guidelines on phishing training emphasize that employees need clear guidance on recognizing and reporting suspicious requests, including app authorization prompts that fall outside normal business operations.

Step 1: Inventory All Connected Applications

You cannot protect what you don’t know exists. Start by listing every third-party application connected to your primary business platforms. In Google Workspace, this lives under Admin Console > Security > API Controls > Third-party app access. For Microsoft 365, check Azure Active Directory > Enterprise Applications.

Create a simple spreadsheet with these columns:

  • Application name
  • Publisher/developer
  • Date authorized
  • Which employee authorized it
  • Permissions granted
  • Business justification

Most small business owners completing this exercise for the first time find 15-30 connected applications they didn’t know about. Some are legitimate tools employees adopted. Others are abandoned apps from former staff. A few might be completely unknown, and those deserve immediate investigation.

Step 2: Review Permission Scopes

Each connected application requests specific permissions when first authorized. A calendar scheduling tool might ask to read your calendar events. That makes sense. If the same tool asks to read all your emails, access your contacts, and send messages on your behalf, something is wrong.

Review each application’s permission scope against its stated purpose. Watch for these red flags:

  • Read/write access to all files when the app only needs specific folders
  • Email sending permissions for tools that don’t send emails
  • Contact access for single-purpose utilities
  • Admin-level permissions for regular productivity apps

The fake Salesforce Data Loader app in the Google breach requested full API access, far more than the legitimate tool requires. An employee familiar with normal permission requests might have spotted this discrepancy.

Step 3: Establish an Approval Process for New Applications

The consent phishing attack succeeds because employees can authorize apps without oversight. Creating a simple approval process adds a checkpoint that catches most threats.

For businesses with 5-50 employees, this doesn’t need to be complicated. A shared document or form works fine. Before any employee connects a new application to company systems, they answer three questions:

  • What is the business need this app addresses?
  • Is this the official app from the vendor (verify the publisher)?
  • What permissions does it request, and do they match the stated purpose?

Designate one person, often the business owner or office manager, to review and approve requests. This review takes five minutes per application and prevents the vast majority of consent phishing attempts.

Your phishing awareness training program should include instruction on this approval process so employees understand why it exists and how to use it.

Step 4: Configure Platform-Level Restrictions

Both Google Workspace and Microsoft 365 allow administrators to restrict which applications users can authorize. This technical control backs up your policy with enforcement.

For Google Workspace:

  1. Go to Admin Console > Security > API Controls
  2. Select “Configure new app” to pre-approve trusted applications
  3. Set the default for unlisted apps to “Limited” or “Blocked”
  4. Enable alerts for new app authorizations

For Microsoft 365:

  1. Access Azure Active Directory > Enterprise Applications > Consent and permissions
  2. Set “Users can consent to apps accessing company data” to No
  3. Configure admin consent workflow so requests route to your designated approver
  4. Review the “Risky applications” report monthly

These settings prevent employees from accidentally granting access to malicious applications. When someone tries to authorize an unapproved app, they receive a message explaining how to submit a request through proper channels.

How to Implement Automated Phishing Training Alongside Your SaaS Audit

Technical controls catch some consent phishing attempts. Trained employees catch the rest. Research on phishing training effectiveness shows that regular simulations reduce click rates by 50% or more over time.

Zero-setup cybersecurity training platforms now exist specifically for small businesses without IT departments. These services automatically generate realistic phishing tests, including consent phishing scenarios, and deliver immediate training when employees fall for simulations.

The most effective approach combines your SaaS identity audit with ongoing training:

  • Run your initial audit to understand current exposure
  • Configure platform restrictions to prevent unauthorized apps
  • Deploy automated training that includes OAuth and consent phishing scenarios
  • Schedule quarterly re-audits to catch new risks

When selecting a training platform, look for one that adapts difficulty based on employee performance. Someone who consistently identifies phishing attempts should receive harder tests. An employee who struggles needs more frequent, simpler scenarios until their skills improve.

Step 5: Create a Response Plan for Suspected Compromises

Even with training and technical controls, an employee might eventually authorize a malicious application. Having a response plan ready reduces damage and speeds recovery.

Your plan should cover:

Immediate actions (within 1 hour):

  • Revoke the suspicious application’s access tokens
  • Change the affected employee’s password
  • Review recent activity logs for data access

Short-term investigation (within 24 hours):

  • Determine what data the application accessed
  • Check if other employees authorized the same app
  • Notify affected parties if customer data was exposed

Longer-term improvements:

  • Update training to include the specific attack pattern
  • Tighten platform restrictions if gaps were exploited
  • Document the incident for future reference

Write this plan down before you need it. During an actual incident, stress makes clear thinking difficult. A documented checklist keeps you focused on the right steps.

Building Consent Phishing Awareness Into Your Training Program

Traditional phishing training focuses on email. Your program needs to expand beyond the inbox. Include these consent phishing scenarios in your regular simulations:

  • Fake productivity apps requesting excessive permissions
  • Impersonated versions of tools your company actually uses
  • Authorization prompts arriving through unexpected channels (text messages, social media)
  • Apps with slightly misspelled publisher names

The Department of Justice phishing training program recommends testing employees with scenarios that mirror real attacks. The Google/Salesforce breach used a fake Data Loader app because many organizations legitimately use that tool. Your simulations should target the specific applications your business relies on.

Zero-setup cybersecurity training platforms handle this automatically. They research your industry and company structure, then generate tests using realistic scenarios your employees would actually encounter. This personalization makes training more effective than generic phishing simulations.

Maintaining Your SaaS Security Posture

A one-time audit isn’t enough. Cloud environments change constantly. Employees add new tools. Vendors update their applications. Attackers develop new techniques.

Set a quarterly calendar reminder to:

  • Re-run your application inventory
  • Review any new authorizations since the last audit
  • Check training completion rates and simulation results
  • Update your approved application list based on business needs

Small businesses that treat SaaS security as an ongoing process rather than a one-time project see dramatically better outcomes. The companies affected by the Google/Salesforce breach had security programs. They just weren’t watching the right things.

Your combination of regular audits, platform restrictions, employee training, and response planning creates multiple layers of defense. An attacker would need to bypass all of them to succeed. That’s exactly the kind of protection small businesses need against consent phishing and the broader category of identity-based attacks targeting organizations without dedicated security teams.

Start Building Your Human Firewall

Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.

This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.