top of page

KAPPA TECHNOLOGY BLOG 

Lucy Hoover

HOW TO IDENTIFY A MALICIOUS LINK WITHOUT CLICKING IT


Malicious email is a security threat we continue to face. Email spam filters are a good defense, but being alert to possible fraud and how to identify a malicious email is your best defense. It's normally safe to open emails, but clicking links can be hazardous. Below we will help you understand these threats and how to effectively protect yourself.

Cyber-criminals sometimes use links in email-based attacks to steal privileged information, install malware and lure you to malicious websites. It is everyone's responsibility to understand these threats and make sure that you know which links are safe to click on and which ones to ignore.

SOME RED FLAGS TO HELP YOU IDENTIFY MALICIOUS EMAIL:

1. The "To" field is blank or for another person.

2. The email includes typos or grammatical errors.

3. The sender's address is suspicious or the name of the sender does not match the email address.

For Example:

4. The message requires immediate action to avoid a problem like losing access to an account OR the message contains an urgent request for personal information, like passwords and other private information.


For Example:


5. When hovering (NOT CLICKING) over the link the true destination does not match what you are expecting.

For Example:

KAPPA ADVISES USERS TO BE ON GUARD AND TO ADHERE TO THE FOLLOWING SECURITY BEST PRACTICES:

  • Exercise caution when receiving unsolicited, unexpected or suspicious emails.

  • Avoid clicking on links in unsolicited, unexpected, or suspicious emails.

  • Avoid opening attachments in unsolicited, unexpected, or suspicious emails.

  • Hover over links to view the full website address.

  • Allow Kappa to keep security software up-to-date.


CONCLUSION

Cybersecurity requires an understanding of potential threats. The best defense is you! Treat all links as suspicious. Bottom line is if in doubt, don't trust the link you are sent. Call us for more information on how Kappa focuses on IT security that can bolster your cybersecurity defenses.

bottom of page