Back
Cyber Security Training & Software for Companies | MetaCompliance

Products

Discover our suite of personalised Security Awareness Training solutions, designed to empower and educate your team against modern cyber threats. From policy management to phishing simulations, our platform equips your workforce with the knowledge and skills needed to safeguard your organisation.

Cyber Security eLearning

Cyber Security eLearning to Explore our Award-Winning eLearning Library, Tailored for Every Department

Security Awareness Automation

Schedule Your Annual Awareness Campaign In A Few Clicks

Phishing Simulation

Stop Phishing Attacks In Their Tracks With Award-Winning Phishing Software

Policy Management

Centralise Your Policies In One Place And Effortlessly Manage Policy Lifecycles

Privacy Management

Control, Monitor, and Manage Compliance with Ease

Incident Management

Take Control Of Internal Incidents And Remediate What Matters

Back
Industry

Industries

Explore the versatility of our solutions across diverse industries. From the dynamic tech sector to healthcare, delve into how our solutions are making waves across multiple sectors. 


Financial Services

Creating A First Line Of Defence For Financial Service Organisations

Governments

A Go-To Security Awareness Solution For Governments

Enterprises

A Security Awareness Training Solution For Large Enterprises

Remote Workers

Embed A Culture Of Security Awareness - Even At Home

Education Sector

Engaging Security Awareness Training For The Education Sector

Healthcare Workers

See Our Tailored Security Awareness For Healthcare Workers

Tech Industry

Transforming Security Awareness Training In The Tech Industry

NIS2 Compliance

Support Your Nis2 Compliance Requirements With Cyber Security Awareness Initiatives

Back
Resources

Resources

From posters and policies to ultimate guides and case studies, our free awareness assets can be used to help improve cyber security awareness within your organisation.

Cyber Security Awareness For Dummies

An Indispensable Resource For Creating A Culture Of Cyber Awareness

Dummies Guide To Cyber Security Elearning

The Ultimate Guide To Implementing Effective Cyber Security Elearning

Ultimate Guide To Phishing

Educate Employees About How To Detect And Prevent Phishing Attacks

Free Awareness Posters

Download These Complimentary Posters To Enhance Employee Vigilance

Anti Phishing Policy

Create A Security-Conscious Culture And Promote Awareness Of Cyber Security Threats

Case Studies

Hear How We’re Helping Our Customers Drive Positive Behaviour In Their Organisations

A-Z Cyber Security Terminology

A Glossary Of Must-Know Cyber Security Terms

Cyber Security Behavioural Maturity Model

Audit Your Awareness Training And Benchmark Your Organisation Against Best Practice

Free Stuff

Download Our Free Awareness Assets To Improve Cyber Security Awareness In Your Organisation

Back
MetaCompliance | Cyber Security Training & Software for Employees

About

With 18+ years of experience in the Cyber Security and Compliance market, MetaCompliance provides an innovative solution for staff information security awareness and incident management automation. The MetaCompliance platform was created to meet customer needs for a single, comprehensive solution to manage the people risks surrounding Cyber Security, Data Protection and Compliance.

Why Choose Us

Learn Why Metacompliance Is The Trusted Partner For Security Awareness Training

Employee Engagement Specialists

We Make It Easier To Engage Employees And Create a Culture of Cyber Awareness

Security Awareness Automation

Easily Automate Security Awareness Training, Phishing And Policies In Minutes

MetaBlog

Stay informed about cyber awareness training topics and mitigate risk in your organisation.

What to Do If You Click on a Phishing Link in an Email or SMS

What to do if you click on a phishing link | MetaCompliance

about the author

Share this post

What to do if you click on a phishing link? As phishing scams and schemes evolve with increasingly creative tactics, it’s crucial to know how to protect yourself against these evolving threats. Explore further to learn the necessary steps in case you click on a suspicious link in an email or SMS.

Phishing scams and schemes are becoming more creative every day 

More people than ever are getting caught out by phishing scams and clicking on links that are designed to steal sensitive information or infect their computer with malware.

We hear about these scams week in and week out in the press and think there’s no way we would fall for these elaborate hoaxes. However, as we’ve become more knowledgeable about the signs of a phishing scam, the attackers have become more sophisticated and targeted in their approach.

The phishing emails that we receive in our inbox are increasingly well written, personalised, contain the logos and language of brands we know and trust and are crafted in such a way that it’s difficult to distinguish between an official email and a dodgy email drafted by a scammer.

The increasing sophistication of these emails has tricked many people into clicking on links which have been quickly followed by a feeling of panic and dread as victims wonder what’s going to happen next and if there’s any way they can reduce the damage.

What to do if you click on a phishing link: four immediate actions

If you are in the unfortunate position of having clicked on a phishing link or downloaded a malicious attachment, there are a number of steps you should take immediately.

1. Suspicious Link Clicked? Disconnect Your Device

Suspicious Link Clicked? Disconnect Your Device

What to do if you click on a phishing link? The first and most important step you need to take is to immediately disconnect your device from the internet. The best way to do this is to unplug the internet cable from your computer or laptop. If you are connected through a Wi-Fi network, you’ll need to access your Wi-Fi settings and disconnect from the current network or turn off the power to your router. This will help reduce the risk of malware spreading to other devices on your network and prevent an attacker from remotely accessing your device.

2. What to do if you click on a phishing link? Back Up Your Files

What to do if you click on a phishing link? Back Up Your Files

Vous avez cliqué sur un lien phishing ? Sauvegardez vos fichiers

As soon as you have disconnected your device from the internet, the next step is to back up your files. In the aftermath of a phishing attack, data can easily be destroyed or deleted so it’s important to make back ups of all your documents and sensitive information, as well as personal files such as family photos and videos. Data can be backed up on to an external hard drive, USB or cloud storage. Offline back-ups will ensure that in the event of an attack, you won’t lose any personal files.

 3. Respond to a Clicked Phishing Link: Conduct a Comprehensive Malware Scan

Respond to a Clicked Phishing Link: Conduct a Comprehensive Malware Scan

The next step is to scan your machine for malware using anti-virus software. You will need to launch the program and conduct a full system scan. If an error message pops up notifying you that you cannot run the scan as you’re not connected to the internet, ignore this. You will still be able to run a scan offline. If you’re connected to the internet you will increase the chance of malware spreading through the network so it’s important to remain disconnected.

Leave your machine to scan and don’t touch your device during this process. As soon as the scan is complete, you will be notified if any suspicious files were found and instructed whether to delete or quarantine them. Depending on your level of technical expertise, you could conduct the scan yourself using a reputable Anti-Virus software program, or you can take your device to a professional to make sure it’s thoroughly cleared of any potential malware.

4. What to do if you click on a phishing link? Change Your Password

What to do if you click on a phishing link? Change Your Password

If you suspect you’ve become the victim of a phishing attack, you should change your password immediately. One of the main objectives of a phishing attack is to steal personal information such as usernames, passwords, credit card numbers, bank details and other sensitive information. Malware is often embedded within a phishing link as it will harvest and store this data for an attacker.

If you’ve entered any personal information, you should change these details as soon as possible from an uncompromised machine. This will apply to all online accounts such as email, social media and banking.

Don’t make it easy for criminals to gain access to your data by using the same password for multiple accounts. Choose a different password for each account or consider using two factor authentication as an extra layer of defence.

Despite the increasing sophistication and convincing nature of these emails, there are still some giveaway signs that may alert you to the presence of a phishing email. These include threatening language, a generic greeting, poor grammar, spelling mistakes, a mismatched URL, claims of prizes or a request for personal information. Legitimate businesses will never send emails or texts requesting you click on a link to enter or update personal data.

The Ultimate Guide to Phishing

Our Ultimate Guide to Phishing details what phishing is and offers top tips on how to spot a phish, as well as how to protect your organisation from phishing attacks. Download your free copy of the Ultimate Guide to Phishing.

Find Out More About Phishing

Top 5 Tips to Beat the Hackers

10 Signs Your Smartphone Has Been Hacked

Top 5 Phishing Scams

The Ultimate Guide to Phishing

phishing French img

Prevent Phishing Attacks

Our phishing simulation software MetaPhish platform has been specifically designed to protect businesses from phishing and ransomware attacks and provides the first line of defence in combating cyber-crime.

If you would like further information on how to protect yourself from phishing and ransomware attacks, click here, to find out how MetaCompliance can help. 

Other Articles on Cyber Security Awareness Training You Might Find Interesting

duckduckgo vs google EN

DuckDuckGo vs Google – 5 reasons why you should give up using Google!

You were not aware that DuckDuckGo is a search engine? Well, now you know. Since its founding in 2008, DuckDuckGo has made it its mission to develop a search engine that does not store or share personal data, quite unlike Google. Google’s business model is based less on data protection and more on personalised advertising. Without the storage of personal data, Google would virtually lose the air it breathes. However, Google is still the most used search engine, and there are reasons for that. Google does have one weakness, however, and that is data protection.
Read More »
dataprotection vs informationsecurity EN

Information Security vs Data Protection

Is this an issue for our ISO or our DPO, or is it much the same in either case? Who exactly is responsible for this incident, and is there a need to report it at all? In order to discuss the similarities and differences between information security and data protection, the first step is to define the two areas.
Read More »