The logo for ertech pros it cloud compliance cybersecurity
(855) ER-TECH-1
A white background with a few lines on it
A white background with a few lines on it
(855) ER-TECH-1

To Click or Not To Click: Tips to Know if a Link is Safe

September 24, 2020

For many years now, email has been the most common way for cybercriminals to infiltrate networks, plant ransomware, and steal data. In fact, in 2019, Verizon reports that 94% of malware was delivered by email.


And while email security certainly has come a long way, cyberattackers are adapting to the changes as well.


Because it’s getting more and more difficult to upload a malicious piece of code to an email, attackers are shifting to different tactics—tactics that email providers will have a hard time figuring out.

What You See Isn’t Always What You Get

One tactic that cybercriminals use is redirecting users to malicious web pages through malicious or hidden links. A common way to do this is by link cloaking or, in simple terms, disguising a link or Uniform Resource Locator (URL) as something else.


What may look like a link to your online bank portal could lead to a malicious site that steals your username and password the moment you enter them.


If you find a link in one of your emails and you’re not sure if it’s safe to click or not, here are a few tips that can help you make the wise and safe choice:


Hover over it

Hovering over a link means placing your mouse pointer over a link without actually clicking it. It may sound too easy to be a cybersecurity tip, but it’s actually a quick way to display the true destination of a link. 


Just hover over a suspicious link—the mouse pointer should change into a pointing finger—and check the target of the link at the bottom of the window. This way, you’ll know whether or not the link is taking you to the site you’re expecting it to.


Scan it

There are reputable websites that can scan a URL, analyze it, and let you know if it’s safe to click or not. They check the website that the link leads you to and inform you if the site has been reported for phishing, hosting malware or viruses, or other suspicious activities. 


Here are some of the trusted and most popular URL scanning sites:


To use these sites, you’ll need to scan the actual URLs and not the cloaked ones. To get the actual URL, you need to right-click the link, and then click Copy Link Address. You then paste it to the entry box on the site and submit it.

A free guide to keep your clinic data safe from cyberattacks.

Expand it

URLs are shortened for a variety of reasons. It keeps the links looking neat, it saves space especially when there’s a character limit to a post, and it can help track metrics on who clicked or shared the links.


Unfortunately, a shortened link doesn’t display its true destination even when you hover over it. This is a problem because you won’t be able to know if the link will take you to the site you’re expecting it to…and it could lead you to a malicious site if you’re not careful.


What you can do is expand a shortened URL to see its original form, title, keywords, author, which search engines you can use to search it, and if it’s safe to click. Visit a trusted link expander site or download a trusted browser extension, and use them to expand the link.


Stay one step ahead.

Cybercriminals are experts at knowing the latest online security features and finding a way around them. This is exactly why you need to know what they’re up to so that you can keep a careful eye out for potential cyber attacks.


Although sometimes, keeping updated just isn’t enough. If you want to protect your personal and corporate networks from malware and phishing attacks, make sure you have the most secure technology at hand and the most reliable IT experts  on call.

 

Get more cybersecurity tips straight from the experts.

TALK TO OUR EXPERTS NOW

Search Articles

Data from all over the world are stored securely through cloud management platforms.
By Jadys Merill Diez December 19, 2024
From saving time to cutting costs, cloud hosting benefits businesses. Explore its benefits and why ER Tech Pros is your best partner.
Login credentials are being filled in automatically in the browser.
By Jadys Diez November 8, 2024
Is your browser-based password manager secure enough for work? Learn the risks and discover safer alternatives for businesses.
A shield with a padlock on it is surrounded by icons.
By Jadys Diez October 25, 2024
Cloud-based or on-site? Compare IT solutions for healthcare, covering data security, scalability, cost, and more in this comprehensive guide.
A cityscape with a lot of buildings and icons on it.
October 21, 2024
Discover how to turn IT from a cost center into a profit driver. Learn strategies to optimize technology investments, boost efficiency, and align IT with business goals for greater profitability.
A city at night with a lot of icons connected to each other.
By Jadys Merill Diez September 18, 2024
Is your medical clinic ready for Wi-Fi 7? Understand its benefits, assess your needs, and learn how ER Tech Pros can guide you.
A blue arrow pointing down on a dark background
By Jadys Merill Diez July 18, 2024
Learn to spot and avoid dangerous download links. Keep your business safe from cybersecurity threats with expert insights from ER Tech Pros.
An aerial view of a city at night with a lot of wifi signals coming out of the buildings.
By Jadys Merill Diez July 10, 2024
Don't let public Wi-Fi put your data at risk – rely on ER Tech Pros' cybersecurity expertise for comprehensive protection.
A man is using a tablet computer with a check mark on it.
By Aprillice Tangpos June 4, 2024
ER Tech Pros is a reliable partner that offers the best healthcare cybersecurity identifying the factors to eliminate cybersecurity threats in healthcare.
A computer screen with the word hacked on it
By Jadys Merill Diez May 24, 2024
Partnering with trusted healthcare cybersecurity firms like ER Tech Pros exists to protect our data from hacking to ensure that sensitive data remains protected.
data diddling
By Aprillice Alvez April 15, 2024
Protect your healthcare practice from data diddling by educating your team on vulnerabilities and investing in prevention techniques like data validation.
Show More

Healthcare & Tech Articles

Data from all over the world are stored securely through cloud management platforms.
By Jadys Merill Diez December 19, 2024
From saving time to cutting costs, cloud hosting benefits businesses. Explore its benefits and why ER Tech Pros is your best partner.
Login credentials are being filled in automatically in the browser.
By Jadys Diez November 8, 2024
Is your browser-based password manager secure enough for work? Learn the risks and discover safer alternatives for businesses.
A shield with a padlock on it is surrounded by icons.
By Jadys Diez October 25, 2024
Cloud-based or on-site? Compare IT solutions for healthcare, covering data security, scalability, cost, and more in this comprehensive guide.
More Posts
Share by: