Security Awareness

What do I do if I click on a phishing link?

Implementation
Information Security
Security Awareness

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

If you accidentally clicked on a phishing email, it's important to act quickly. In this way, you can limit the damage. Often, an organization has developed a policy that states what to do. Not sure what to do? Then follow the steps below:

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

This article was last updated on
24.03.2026
Written by
Ruben
Renter
Marketing Specialist

Complete the following 8 steps

1. Close and disconnect the browser:

  • Close all your browser tabs and windows immediately.
  • Disconnect the Internet connection (for example, by turning off Wi-Fi).

2. Change your passwords:

  • Change the passwords for any accounts that you think may have been compromised. Start with your email password and then continue with important accounts such as bank accounts, social media, and other sensitive accounts.

3. Check for malware:

  • Run a full scan with an up-to-date antivirus program to check for malware or viruses that may be installed on your device.
  • If malware is found, follow the instructions of your antivirus program to remove it.

4. Check your financial accounts:

  • Check your bank and credit card statements for suspicious activity. Report any unauthorized transactions to your bank immediately.

5. Contact your IT department or an expert:

  • If you work for a company, report the incident to the IT department immediately.
  • If you need personal help, consider contacting an IT expert for further assistance.

6. Secure your accounts:

  • Activate two-step verification (2FA) where possible to add an extra layer of security to your accounts.
  • Review your account security settings and make sure everything is up to date.

7. Block the sender and report the phishing email:

  • Block the sender of the phishing email to prevent further attempts.
  • Report the phishing email to your email provider. Many providers have a feature to report phishing.

8. Learn from the incident:

  • Spend time learning how to recognize phishing emails, as required by the ISO 27001 and NO 7510. This can help prevent future incidents.

Questions?

💬 If you have any questions, please feel free to contact contact us or schedule a free introduction!

Heading 1

Heading 2

Heading 3

Heading 4

Heading 5
Heading 6

Lorem ipsum by sit amet, consectetur adipiscing elit, sed do eusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat. Dis aute irure door in reprehenderit in voluptate velit se cillum dolore eu fugiat nulla pariatur.

Block quote

Ordered list

  1. Item 1
  2. Item 2
  3. Item 3

Unordered list

  • Item A
  • Item B
  • Item C

Text link

Bold text

Emphasis

Superscript

Subscript

How many people participate?

Request now

Thanks!
Oops! The form could not be submitted. Please try again.

More resources

News

Dag stoffige consultancy, hallo Next-Gen C!

thru
Ruben
Blog
Partners

Our Trusted MSPs

thru
Jurre
Blog
Implementation

What documents do you need for ISO 27001 proof?

thru
Mathijs
Kennisartikel