What if I clicked on a phishing email?

by Jon Lober | NOC Technology

Just a quick refresher—
what is email phishing?


Phishing is a type of cyberattack where attackers try to trick you into giving away sensitive information—like passwords, credit card numbers, or even access to your business’s network—by pretending to be someone you trust. These emails often look like they’re from legitimate companies, like your bank, a well-known retailer, or even someone within your own organization.


The goal? To get you to click on a malicious link or download an attachment that can compromise your system. Sometimes, the emails are obvious fakes, but other times, they can be extremely convincing, making it crucial to stay vigilant.

But here's the thing— recognizing a phishing email is only half the battle. What you do next is equally important. So let's break down the steps you should take when you suspect you've received a phishing email.


Don't Panic

First and foremost, don't panic. Take a deep breath and resist the urge to immediately delete the email.
Wait— don’t delete it? Why? Because your IT team or security provider can actually use that email to strengthen your defenses.


Instead, here's what you should do:

  1. Don't click on any links or download any attachments.
    This is crucial. Even if the email looks legitimate, treat it with suspicion.
  2. Forward the email to your IT department or security provider.
    Most companies have a dedicated email address for reporting suspicious messages. If you're not sure, check with your IT team.
  3. After forwarding, delete the email from your inbox.
    Also, empty your trash folder to ensure it's completely gone from your system.
  4. If you accidentally clicked a link or downloaded an attachment,
    disconnect your device from the network immediately and contact your IT support.
  5. Lastly, and this is important - educate your team.
    Share this information with your employees. Sure, you would never click on that link, but what about Brenda over in HR or Mike in sales? Remember, your company's cybersecurity is only as strong as your least-informed team member.


But what if you're not sure it's a phishing email to start with? When in doubt, err on the side of caution. It's far better to report a legitimate email as suspicious than to fall victim to a phishing attack. Hover over any suspicious links before clicking them. This will show you the actual URL, which can often reveal if it's a scam.


Remember, staying vigilant against phishing isn't just about protecting your data - it's also about safeguarding your business's reputation and your customers' trust.


Learn more with my FREE book!



How to keep hackers from hijacking your inbox

In this book, CEO Jon Lober shows us what it looks like when a business is the target of an attack, what the consequences of an attack are, and how to protect your business from a phishing attack.

Request a copy
Brace your business against these top five cyber threats to SMBs
By Jon Lober April 29, 2025
Are you taking unnecessary risks with your data?
Missouri Sheltered Workshops can empower human potential through AI
By Jon Lober April 24, 2025
Embracing the potential of both AI and humans
Tech upgrades that will boost employee safety in sheltered workshops
By Jon Lober April 15, 2025
At NOC Technology, we've worked with Missouri sheltered workshops for over seven years, and I've witnessed firsthand how the right technological implementations can transform sheltered workshop environments. Today, I'd like to share some insights on leveraging modern technology to create safer workspaces while maintaining the dignity and privacy of all participants. The Unique Safety Challenges of Sheltered Workshops Sheltered workshops provide valuable employment opportunities for individuals with disabilities, but they also present unique safety considerations. Workers may have varying levels of physical mobility, cognitive processing, and sensory perception—all of which can impact how they respond to traditional safety measures. Additionally, the production environments often involve machinery, tools, and materials that require careful monitoring and management. The Role of Smart Technology in Safety Advancements in smart technology provide real-time safety monitoring, immediate alerts for potential hazards, and improved emergency response times. Let’s explore some key technologies and their benefits in sheltered workshop environments. Personalized Alert Systems Traditional emergency alarms can be overwhelming for individuals with sensory sensitivities. Smart alert systems can deliver personalized notifications through: Vibrating wristbands that alert workers without auditory overload Visual notification systems with customizable colors and patterns Tablet-based communication for workers who benefit from visual cues Location-specific alerts that only notify those in affected areas We recently implemented a multi-modal alert system at a workshop in central Missouri that reduced anxiety-related incidents during emergency drills by 65% . Environmental Monitoring Maintaining optimal environmental conditions is crucial for both safety and productivity: Temperature and humidity sensors that automatically adjust HVAC systems Air quality monitors that detect potentially harmful particulates Noise level monitoring to prevent sensory overload Automated ventilation systems that activate when chemical levels exceed thresholds These systems not only protect workers but also provide documented compliance with OSHA regulations. Enhanced Supervision through Smart Cameras Security cameras have evolved beyond simple surveillance. Modern systems can: Detect unusual patterns that might indicate a worker in distress Monitor restricted areas without constant staff presence Identify when machinery is being used incorrectly Alert supervisors to potential safety hazards Important note: All camera systems should be implemented with strict privacy protocols and transparent policies. Workers and guardians should be fully informed about what is being monitored and why. In many cases, audio cannot be recorded, and the camera system must be configured to meet this requirement. Wearable Safety Technology Wearable devices offer personalized safety monitoring without stigmatization: Fall detection pendants that automatically alert staff Location tracking that helps locate workers in emergency situations Biometric monitoring for workers with health conditions Proximity sensors that prevent accidental entry into hazardous areas These wearables can be designed to look like standard ID badges or watches, preserving dignity while enhancing safety. Implementation Best Practices Successfully integrating smart technology into sheltered workshops requires careful planning: Involve all stakeholders: Workers, guardians, and staff should participate in selecting and implementing new technologies. Prioritize simplicity: Choose solutions that require minimal training and maintenance. Phase in gradually: Introduce new technologies in stages to allow everyone time to adapt. Balance automation with human oversight: Technology should supplement, not replace, trained staff. Respect privacy: Collect only essential data and maintain strong security protocols.
More Articles