What if I clicked on a phishing email?

by Jon Lober | NOC Technology

Just a quick refresher—
what is email phishing?


Phishing is a type of cyberattack where attackers try to trick you into giving away sensitive information—like passwords, credit card numbers, or even access to your business’s network—by pretending to be someone you trust. These emails often look like they’re from legitimate companies, like your bank, a well-known retailer, or even someone within your own organization.


The goal? To get you to click on a malicious link or download an attachment that can compromise your system. Sometimes, the emails are obvious fakes, but other times, they can be extremely convincing, making it crucial to stay vigilant.

But here's the thing— recognizing a phishing email is only half the battle. What you do next is equally important. So let's break down the steps you should take when you suspect you've received a phishing email.


Don't Panic

First and foremost, don't panic. Take a deep breath and resist the urge to immediately delete the email.
Wait— don’t delete it? Why? Because your IT team or security provider can actually use that email to strengthen your defenses.


Instead, here's what you should do:

  1. Don't click on any links or download any attachments.
    This is crucial. Even if the email looks legitimate, treat it with suspicion.
  2. Forward the email to your IT department or security provider.
    Most companies have a dedicated email address for reporting suspicious messages. If you're not sure, check with your IT team.
  3. After forwarding, delete the email from your inbox.
    Also, empty your trash folder to ensure it's completely gone from your system.
  4. If you accidentally clicked a link or downloaded an attachment,
    disconnect your device from the network immediately and contact your IT support.
  5. Lastly, and this is important - educate your team.
    Share this information with your employees. Sure, you would never click on that link, but what about Brenda over in HR or Mike in sales? Remember, your company's cybersecurity is only as strong as your least-informed team member.


But what if you're not sure it's a phishing email to start with? When in doubt, err on the side of caution. It's far better to report a legitimate email as suspicious than to fall victim to a phishing attack. Hover over any suspicious links before clicking them. This will show you the actual URL, which can often reveal if it's a scam.


Remember, staying vigilant against phishing isn't just about protecting your data - it's also about safeguarding your business's reputation and your customers' trust.


Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
CEO and tech expert Jon Lober explains what is CMMC
By Jon Lober February 18, 2025
Cybersecurity compliance for handling CUI is evolving in 2025. In this episode of Tech Therapy, Jon covers both what is CUI and what is CMMC, and what does it matter to US manufacturers.
NOC Technology provides award-winning IT support for our neighbors in Pacific, MO
By Jon Lober February 18, 2025
Pacific, MO deserves better IT.
Tech therapy brings real listening and tech advice to business leaders.
By Jon Lober February 11, 2025
If you've followed us on The NOCout Report, you know we've spent some time digging into tech trends, cybersecurity best practices, and ways businesses can leverage IT to thrive. But as we step into 2025, we're making a pivot—one that’s all about diving deeper into the real challenges that you as a business owner or leader face. Tech therapy brings real conversations about the technology that is keeping you up at night.
More Articles
Share by: