{"id":18353,"date":"2024-07-14T13:34:00","date_gmt":"2024-07-14T13:34:00","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18353"},"modified":"2024-07-15T13:10:51","modified_gmt":"2024-07-15T13:10:51","slug":"what-to-do-if-you-click-on-a-phishing-link","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/","title":{"rendered":"What Happens if You Click on a Phishing Link?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Phishing scams are extremely widespread these days. This scam consists of hackers tricking users into clicking on phishing links in order to steal their personal information. Such frauds target a large number of corporate employees and people&#8217;s personal emails every day.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s critical to understand what to do if you accidentally click on a phishing link, the risks of opening <a href=\"https:\/\/easydmarc.com\/blog\/what-is-spam-email-and-how-to-prevent-it\/\">spam emails<\/a> with spam links in them, and the dangers of opening unfamiliar email attachments. What if you clicked on a phishing link?<\/span><\/p>\n<h2><strong>What Happens if You Click On A Phishing Link?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">By clicking on a phishing link or opening an attachment, you risk infecting your device with <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/malware\">malware<\/a>\u00a0and <a href=\"https:\/\/docs.google.com\/document\/u\/1\/d\/1HRyerigsP_uOHQL-UJN0jLWS7HClxYMmNmAf2lYl2wI\/edit\">viruses<\/a>. This is all done behind the scenes, so the average user won&#8217;t notice. Now, <strong>what happens\u00a0<\/strong><\/span><strong>if you accidentally click on a phishing link<\/strong>? In one scenario, the link might redirect you to a malicious website. Then, the site might use keyloggers to harvest your personal details. In another scenario, a background download might nestle a malicious program. This download can also lead to a myriad of developments like ransom demands, man-in-the-middle attacks, spyware, and other issues.<\/p>\n<p>The general rule of thumb is to <strong>check the phishing URL<\/strong>\u00a0with a special tool before clicking it. Still, everyone makes mistakes. What if you&#8217;ve already been redirected?\u00a0<span style=\"font-weight: 400;\">Following the steps below will help you stop or reduce the damage.<\/span><\/p>\n<h2><strong>What to Do If You Click on a Phishing Link?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Despite the sophisticated and convincing nature of these emails, there are still several telltale signs that you&#8217;re dealing with a phishing email &#8211; threatening language, a generic greeting, poor grammar, spelling errors, a misaligned URL, reward claims, or a request for personal information. Legitimate businesses will never send you an email or text asking you to enter or update personal information by clicking on a link.<\/span><\/p>\n<p>If you doubt at all that the link is going to lead you to a malicious website,\u00a0<strong>check the URL for phishing<\/strong>\u00a0first. Find a proper <a href=\"https:\/\/easydmarc.com\/tools\/phishing-url\">phishing URL checker<\/a> tool and let it do its thing before interacting with the link.<\/p>\n<p><span style=\"font-weight: 400;\">However, if you&#8217;ve accidentally clicked on a phishing link or downloaded a malicious attachment, there are a few things to do right away to protect yourself.<\/span><\/p>\n<h3><strong>Disconnect Your Device<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The first and most critical thing you should do is disconnect your device from the internet right away. The best approach to do this is to unplug your computer or laptop&#8217;s internet Wi-Fi. If you&#8217;re connected through a Wi-Fi network, go to your Wi-Fi settings and disconnect from the current network or switch off your router&#8217;s power. This will help to prevent malware from propagating to other devices on your network and prevent an attacker from gaining access to your device.<\/span><\/p>\n<h3><strong>Backup Files<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">After you have unplugged your device from the internet, you&#8217;ll need to back up your data. Data can be lost or deleted in the aftermath of a phishing attempt, so maintain backups of all your documents and sensitive information, as well as personal assets like family photos and videos.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Data can be saved on an external hard drive, a USB flash drive, or in the cloud. Offline backups will ensure that you do not lose any personal files in the event of a cyberattack.<\/span><\/p>\n<h3><strong>Scan System for Malware<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The next step is to use anti-virus software to scan your computer for infection. You must first start the application and do a comprehensive system scan. If you get an error notice saying you can&#8217;t run the scan because you&#8217;re not connected to the internet, ignore it. You&#8217;ll be able to run a scan even if you&#8217;re not connected to the internet. Because staying connected to the internet increases the risk of malware spreading across the network, it&#8217;s critical to stay offline.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Allow your device to scan without interrupting this process. When the scan is finished, you&#8217;ll be told if any suspicious files were discovered and given the option to delete or quarantine them. You can do the scan yourself using a reputable Anti-Virus software application, or you can take your device to a professional to ensure it is properly cleared of any potential infection.<\/span><\/p>\n<h3><strong>Change Your Password<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">A phishing attack&#8217;s main goal is to acquire personal information such as usernames, passwords, credit card numbers, bank account numbers, and other sensitive data. Malware is frequently included in phishing links because it harvests and stores data for an attacker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you&#8217;ve input any personal information, you should change it as quickly as possible from a system that hasn&#8217;t been compromised. All internet accounts, such as email, social media, and banking, will be affected.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By using the same password for many accounts, you make it easier for hackers to acquire access to your data. Make each account&#8217;s password unique, or use two-factor authentication to add an extra layer of security.<\/span><\/p>\n<h3><strong>Setup Two-Factor Authentication<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">The <a href=\"https:\/\/easydmarc.com\/blog\/two-factor-authentication\/\">two-factor authenticatio<\/a><a href=\"https:\/\/easydmarc.com\/blog\/two-factor-authentication\/\">n<\/a> can be done in a number of ways. Register for two-factor authentication if it is available on your account. This adds another degree of security to your account. In addition, if a hacker tries to get access to your account, you will be notified.<\/span><\/p>\n<h3><strong>Enable Web Content Filtering<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">If you&#8217;ve clicked on a phishing link, you should enable security settings that protect you from dangerous links. If phishing emails continue to arrive in your mailbox, online content screening should be enabled. Even if you accidentally click on a link, your browser will prohibit the dangerous site from infecting your device with malware. Web content filtering is a proactive method for detecting and preventing phishing scams.<\/span><\/p>\n<h3><strong>Clean Browser Data and Switch Off Extra Accounts<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Clear the cache and cookies in your browser as well. Close any accounts that you aren&#8217;t using. This is because such accounts can be used as attack ports by an attacker.<\/span><\/p>\n<h3><strong>Report Spam Email<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">You train your account spam filter to avoid getting <a href=\"https:\/\/easydmarc.com\/blog\/what-is-spam-email-and-how-to-prevent-it\/\">spam emails<\/a> in the primary inbox by reporting spam emails. Consequently, the domains and emails used for phishing scam will end but in lists called &#8220;Blacklist&#8221; that will inform all mail service providers of the dangers and unwelcome emails they send. The list of <a href=\"https:\/\/easydmarc.com\/blog\/types-of-phishing-domains-you-should-blacklist\/\">Blacklisted domains<\/a> prevents such email from getting delivered to inboxes and makes sure they bounce.\u00a0\u00a0<\/span><\/p>\n<h2><strong>Best Practices to Protect Yourself From Phishing Attacks<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">You should additionally follow the following steps in addition to the above-mentioned rapid tips:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Make sure your computer&#8217;s software and security are up to date<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use passwords that are difficult to guess.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Change the passwords on any accounts you suspect are compromised<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use different passwords for different accounts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use two-factor authentication\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Backup your files to a secure backup device on a regular basis (ideally one which is not continuously connected to your network)<\/span><\/li>\n<li aria-level=\"1\">Use our <a href=\"https:\/\/easydmarc.com\/tools\/phishing-url\">link tester<\/a> to check any link&#8217;s legitimacy for free.<\/li>\n<\/ul>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Nowadays, phishing emails have become a severe but inescapable hazard. Your best defense is to err on the side of caution and\u00a0<\/span><strong>check the URL for phishing<\/strong>\u00a0before you click it. In case of attachments and other suspicious activity, <span style=\"font-weight: 400;\">deleting suspicious emails or text messages is a wise choice. Remember that a genuine organization or business will never ask you to disclose sensitive, personal information via insecure channels such as email, text messaging, or pop-ups. If the message is crucial, the sender will make an effort to contact you via confirmed channels like phone or letter.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing scams are extremely widespread these days. This &#8230;<\/p>\n","protected":false},"author":1,"featured_media":32580,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,293,289],"tags":[],"class_list":["post-18353","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-phishing","category-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Happens if You Click on a Phishing Link? | EasyDMARC<\/title>\n<meta name=\"description\" content=\"So you&#039;ve clicked on a phishing link and don&#039;t know what to do. This article will get you through what to do if you click on a phishing link.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Happens if You Click on a Phishing Link?\" \/>\n<meta property=\"og:description\" content=\"So you&#039;ve clicked on a phishing link and don&#039;t know what to do. This article will get you through what to do if you click on a phishing link.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-14T13:34:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T13:10:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"What Happens if You Click on a Phishing Link?\",\"datePublished\":\"2024-07-14T13:34:00+00:00\",\"dateModified\":\"2024-07-15T13:10:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/\"},\"wordCount\":1257,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Phishing\",\"Social Engineering\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/\",\"name\":\"What Happens if You Click on a Phishing Link? | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg\",\"datePublished\":\"2024-07-14T13:34:00+00:00\",\"dateModified\":\"2024-07-15T13:10:51+00:00\",\"description\":\"So you've clicked on a phishing link and don't know what to do. This article will get you through what to do if you click on a phishing link.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg\",\"width\":1440,\"height\":910},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/what-to-do-if-you-click-on-a-phishing-link\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Social Engineering\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"Phishing\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/social-engineering\\\/phishing\\\/\"},{\"@type\":\"ListItem\",\"position\":7,\"name\":\"What Happens if You Click on a Phishing Link?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Happens if You Click on a Phishing Link? | EasyDMARC","description":"So you've clicked on a phishing link and don't know what to do. This article will get you through what to do if you click on a phishing link.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/","og_locale":"en_US","og_type":"article","og_title":"What Happens if You Click on a Phishing Link?","og_description":"So you've clicked on a phishing link and don't know what to do. This article will get you through what to do if you click on a phishing link.","og_url":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2024-07-14T13:34:00+00:00","article_modified_time":"2024-07-15T13:10:51+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"What Happens if You Click on a Phishing Link?","datePublished":"2024-07-14T13:34:00+00:00","dateModified":"2024-07-15T13:10:51+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/"},"wordCount":1257,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Phishing","Social Engineering"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/","url":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/","name":"What Happens if You Click on a Phishing Link? | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","datePublished":"2024-07-14T13:34:00+00:00","dateModified":"2024-07-15T13:10:51+00:00","description":"So you've clicked on a phishing link and don't know what to do. This article will get you through what to do if you click on a phishing link.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","width":1440,"height":910},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/what-to-do-if-you-click-on-a-phishing-link\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Social Engineering","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/"},{"@type":"ListItem","position":6,"name":"Phishing","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/social-engineering\/phishing\/"},{"@type":"ListItem","position":7,"name":"What Happens if You Click on a Phishing Link?"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/07\/What-To-Do-If-You-Click-On-a-Phishing-Link_-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18353"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18353\/revisions"}],"predecessor-version":[{"id":41161,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18353\/revisions\/41161"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/32580"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}