You Clicked a Malicious Link.Now What? - GDS Group

You Clicked a Malicious Link.
Now What?

Article - Security
By Kelley Iuele|2nd December 2022

We’re All Being Baited

If you’re like the average employee, you field 14 malicious emails every year. And if your company is like 86% of organizations, you or your colleagues are clicking those links! There are no signals in sight to suggest hackers have any intention of slowing down the attack against your inbox. One of the most common scams employees are likely to encounter are phishing attempts. Here are some tips to recognize them, so you don’t fall prey. 

What Phishing Looks Like

In a phishing attempt, the bad guy is trying to bait you into clicking on a bogus link, sharing information that should be kept private, or opening an infected attachment. The goal is often one (or all) of the below: 

  • Gaining access to your company’s systems 
  • Stealing your company or personal information 
  • Installing malware (viruses, spyware or ransomware) into the company network 

Here are a few common communications bad actors use: 

  • An email (or text) that looks like it’s from a company executive, asking for “urgent” action 
  • An email (or text) that looks like it’s from a financial services provider, with “action required” messaging 
  • An email (or text) that looks like it’s from a social media, delivery, or subscription service, informing you of interrupted service or a missed delivery if you don’t update your account or act now 

Before you take any action—that is, clicking a link or opening an attachment—check the email address, URL, or domain name for inconsistencies. The sender’s name may display as the name of a trusted individual, company executive, or brand name, but look closely. Often the sender’s name and the domain name will not match. Look for misspellings or extra letters, as these are common in “spoof” addresses.  

If you suspect phishing, report the email to your company. You can click the “Report Message” button in Outlook, or forward the email to your help desk or IT team. 

What To Do If You Clicked

If you missed the signs before you clicked, act quickly to protect your personal and company information. 

  • Disconnect your computer (or device) from the internet. Turn off WiFi or unplug the ethernet cord 
  • Notify your manager or help desk immediately (they can help!) 
  • There will likely need to be a scan of the device for viruses (work with IT or help desk as needed) 
  • If the phishing email directed you to a site and you entered any account information, change that password right away! 

Practicing better awareness around your company email account isn’t just a way to be a model employee. You’ll be doing yourself a favor, too, as hackers are targeting individuals and personal email accounts with similar gusto. Stay safe out there! 

Want More Insight?

Want to be part of a panel discussing vital business challenges like these? 
Want to know more about what other businesses are doing to combat threats? 
Want to know what the latest tools and technology are to thwart cyber-attacks? 

Our award-winning event experiences bring senior leaders and technology solution providers together to solve complex challenges like these and drive better business outcomes.  

Explore upcoming events here! 

Back to insights

Related content

Security
Article

Is Simplicity the Way Forward for Cybersecurity?

It’s no exaggeration to say the threat from cyber-attacks has never been greater. But instead of trying to secure everything, is there a simpler way?
Josh Porter
Find out more
Security
Article

Security Summit, Lisbon 2025 | Insights Report

Missed our recent Security Summit, or maybe just want a refresher? Here are all the insights from the main stage.
Adam Burns
Find out more
Security
Article

Chief of Everything – What Does it Mean to be a Modern CISO?

Today’s CISO needs to wear a lot of hats. With so much on one plate, it’s no wonder that CISOs are asking "are we chief of anything?"
Josh Porter
Find out more
Security
Article

Consolidating Cybersecurity: Is it Worth it?

Airtight cybersecurity is what dreams are made of. You just need to figure out how to get there. Consolidate? Or consolidon't?
Patrick Mclean
Find out more
Security
Article

The CISO’s Dilemma – Doing More With Less in Cybersecurity

The list of CISO priorities is growing. Host and editor Ben Thompson, asks: how do CISOs manage the pressure to be more efficient and effective?
Ben Thompson
Find out more
Security
Article

How Do You Balance Security and Agility While Staying Compliant?

If you're not compliant, you're at risk. If you're too focused on compliance, you slow down your ability to innovate. How do you strike the balance?
Josh Porter
Find out more
Security
Article

Cybersecurity in 2025: Challenges and Solutions

With the year ahead of you, now’s a better time than any to start rethinking your security measures.
Patrick Mclean
Find out more
Healthcare
Article

Healthcare: Staying Secure in 2025

For the healthcare industry making a robust cybersecurity strategy not just important but absolutely critical.
Patrick Mclean
Find out more
Security
Article

Building Operational Resilience in 2025

Hear from the experts on how you can prioritize your operational resilience for 2025.
Josh Porter
Find out more

Related events