In July 2025, attackers stole customer data from Google’s Salesforce instance without using a single line of malicious code. The breach affected over three dozen major companies, including Cisco, Adidas, and Chanel. The attack vector? A fake app that looked like a legitimate Salesforce tool. One employee clicked “Allow,” and the attackers walked away with valid API access tokens.
This type of attack, called consent phishing, targets the trust built into modern cloud applications. For small businesses learning how to implement automated phishing training, understanding this threat is just as important as defending against traditional email scams. Your team might spot a suspicious email, but would they question an authorization prompt from what appears to be a trusted vendor?
Most security tools watch for malware, suspicious file downloads, and known bad websites. Consent phishing sidesteps all of these defenses. The attack happens inside legitimate platforms like Google Workspace, Microsoft 365, or Salesforce. The authorization flow is real. The tokens issued are valid. Nothing triggers your antivirus or firewall.
Small businesses face particular exposure here. Without dedicated IT staff monitoring application permissions, malicious apps can sit quietly in your environment for months. The Google breach wasn’t discovered until attackers sent extortion demands, weeks after the initial compromise.
The CISA guidelines on phishing training emphasize that employees need clear guidance on recognizing and reporting suspicious requests, including app authorization prompts that fall outside normal business operations.
You cannot protect what you don’t know exists. Start by listing every third-party application connected to your primary business platforms. In Google Workspace, this lives under Admin Console > Security > API Controls > Third-party app access. For Microsoft 365, check Azure Active Directory > Enterprise Applications.
Create a simple spreadsheet with these columns:
Most small business owners completing this exercise for the first time find 15-30 connected applications they didn’t know about. Some are legitimate tools employees adopted. Others are abandoned apps from former staff. A few might be completely unknown, and those deserve immediate investigation.
Each connected application requests specific permissions when first authorized. A calendar scheduling tool might ask to read your calendar events. That makes sense. If the same tool asks to read all your emails, access your contacts, and send messages on your behalf, something is wrong.
Review each application’s permission scope against its stated purpose. Watch for these red flags:
The fake Salesforce Data Loader app in the Google breach requested full API access, far more than the legitimate tool requires. An employee familiar with normal permission requests might have spotted this discrepancy.
The consent phishing attack succeeds because employees can authorize apps without oversight. Creating a simple approval process adds a checkpoint that catches most threats.
For businesses with 5-50 employees, this doesn’t need to be complicated. A shared document or form works fine. Before any employee connects a new application to company systems, they answer three questions:
Designate one person, often the business owner or office manager, to review and approve requests. This review takes five minutes per application and prevents the vast majority of consent phishing attempts.
Your phishing awareness training program should include instruction on this approval process so employees understand why it exists and how to use it.
Both Google Workspace and Microsoft 365 allow administrators to restrict which applications users can authorize. This technical control backs up your policy with enforcement.
For Google Workspace:
For Microsoft 365:
These settings prevent employees from accidentally granting access to malicious applications. When someone tries to authorize an unapproved app, they receive a message explaining how to submit a request through proper channels.
Technical controls catch some consent phishing attempts. Trained employees catch the rest. Research on phishing training effectiveness shows that regular simulations reduce click rates by 50% or more over time.
Zero-setup cybersecurity training platforms now exist specifically for small businesses without IT departments. These services automatically generate realistic phishing tests, including consent phishing scenarios, and deliver immediate training when employees fall for simulations.
The most effective approach combines your SaaS identity audit with ongoing training:
When selecting a training platform, look for one that adapts difficulty based on employee performance. Someone who consistently identifies phishing attempts should receive harder tests. An employee who struggles needs more frequent, simpler scenarios until their skills improve.
Even with training and technical controls, an employee might eventually authorize a malicious application. Having a response plan ready reduces damage and speeds recovery.
Your plan should cover:
Immediate actions (within 1 hour):
Short-term investigation (within 24 hours):
Longer-term improvements:
Write this plan down before you need it. During an actual incident, stress makes clear thinking difficult. A documented checklist keeps you focused on the right steps.
Traditional phishing training focuses on email. Your program needs to expand beyond the inbox. Include these consent phishing scenarios in your regular simulations:
The Department of Justice phishing training program recommends testing employees with scenarios that mirror real attacks. The Google/Salesforce breach used a fake Data Loader app because many organizations legitimately use that tool. Your simulations should target the specific applications your business relies on.
Zero-setup cybersecurity training platforms handle this automatically. They research your industry and company structure, then generate tests using realistic scenarios your employees would actually encounter. This personalization makes training more effective than generic phishing simulations.
A one-time audit isn’t enough. Cloud environments change constantly. Employees add new tools. Vendors update their applications. Attackers develop new techniques.
Set a quarterly calendar reminder to:
Small businesses that treat SaaS security as an ongoing process rather than a one-time project see dramatically better outcomes. The companies affected by the Google/Salesforce breach had security programs. They just weren’t watching the right things.
Your combination of regular audits, platform restrictions, employee training, and response planning creates multiple layers of defense. An attacker would need to bypass all of them to succeed. That’s exactly the kind of protection small businesses need against consent phishing and the broader category of identity-based attacks targeting organizations without dedicated security teams.
Launch a realistic phishing simulation in minutes and get the tools you need to build a cyber-aware team.
This blog offers general information about phishing and cybersecurity for small and medium-sized organisations. It is not legal, financial, or technical advice. Speak to a qualified professional before acting on any guidance you read here.