Working with the spear-phishing attack vector