
“Don’t Click Bad Links!” – Why This Cybersecurity Advice Still Falls Flat in 2025
The UK’s National Cyber Security Centre (NCSC) published a blog post on March 13th, 2025, highlighting a persistent and frustrating problem: telling users to “avoid clicking bad links” simply isn’t working as a cybersecurity strategy. This might seem obvious, but the continued reliance on this advice underscores a disconnect between security professionals and the realities of user behavior. Let’s break down why this common-sense advice remains ineffective and what needs to change.
The Problem: Why “Just Don’t Click!” Fails
While well-intentioned, relying solely on user vigilance against malicious links suffers from several fundamental flaws:
- Overconfidence and the “It Won’t Happen to Me” Mentality: People often believe they are immune to phishing and other link-based attacks. This overconfidence makes them less cautious, leading them to let their guard down, especially when stressed or multitasking.
- Increasingly Sophisticated Attacks: Attackers are constantly evolving their tactics. Phishing emails are now incredibly convincing, mimicking legitimate emails from trusted sources like banks, social media platforms, or even colleagues. Grammatical errors are becoming less frequent, and the urgency and emotional manipulation employed make it difficult to resist clicking, even for tech-savvy individuals.
- The Power of Context: We click links all day long. We’re conditioned to trust links shared by friends, family, and even brands we regularly interact with. It’s easy to make a snap judgment, especially on mobile devices where less information about the link’s destination is readily available.
- Information Overload: Users are bombarded with security advice, often contradictory or overwhelming. “Don’t click suspicious links,” “Check the URL,” “Look for the padlock icon” – this deluge of information can be confusing and ultimately lead to inaction.
- Human Error is Inevitable: Even with the best training, mistakes happen. Humans are not perfect, and fatigue, distractions, and simply not paying close enough attention can lead to accidental clicks.
- Mobile Vulnerability: Clicking malicious links on mobile devices is particularly problematic. Smaller screens and less visible URLs make it harder to discern a dangerous link. The seamless integration of apps can also make it difficult to tell where a link will actually take you.
What’s the Alternative? Moving Beyond User Vigilance
The NCSC and other cybersecurity experts advocate for a multi-layered approach that goes beyond simply telling users to “be careful.” This approach focuses on mitigating the risk even when users inevitably click on malicious links:
-
Stronger Technical Defenses: This is the most crucial element. Implementing robust security measures behind the scenes can significantly reduce the impact of accidental clicks. Examples include:
- Email Filtering and Anti-Phishing Technology: Advanced filters can detect and block malicious emails before they even reach the user’s inbox.
- Sandboxing: This technology allows suspicious links to be opened in an isolated environment, preventing them from infecting the user’s device or network.
- Multi-Factor Authentication (MFA): Even if a user’s credentials are stolen through a phishing attack, MFA adds an extra layer of security that makes it much harder for attackers to gain access.
- Endpoint Detection and Response (EDR) Systems: These systems monitor endpoints (computers, laptops, mobile devices) for suspicious activity and can quickly detect and respond to threats.
- Regular Software Updates: Keeping software updated patches security vulnerabilities that attackers can exploit.
-
Improved User Education, Focused on Behavioral Change: While not a silver bullet, user education is still valuable. However, it needs to be more effective:
- Practical Simulations: Phishing simulations are a great way to test users’ awareness and identify areas where they need more training. However, simulations should be realistic and relevant to the user’s work and personal life.
- Concise and Actionable Advice: Instead of overwhelming users with technical jargon, focus on simple, easy-to-remember tips.
- Positive Reinforcement: Focus on rewarding safe behavior rather than punishing mistakes.
- Ongoing Training: Cybersecurity threats are constantly evolving, so training should be ongoing and adapted to address the latest threats.
-
A Culture of Security Awareness: Creating a culture where security is a shared responsibility can empower users to report suspicious activity and contribute to a safer environment. This includes:
- Open Communication: Encourage users to report suspicious emails or links without fear of retribution.
- Leadership Buy-In: When leaders demonstrate a commitment to security, it sends a strong message to employees that security is a priority.
- Regular Security Audits: Conducting regular security audits can help identify vulnerabilities and areas for improvement.
The Future of Cybersecurity:
The NCSC’s blog post serves as a reminder that relying solely on user awareness is a losing strategy. The future of cybersecurity lies in a multi-layered approach that combines strong technical defenses, effective user education, and a culture of security awareness. By shifting the focus from blaming users for clicking on bad links to proactively mitigating the risk, organizations can create a more resilient and secure environment for everyone. The goal isn’t to eliminate all risk, but to significantly reduce the impact of human error and make it much harder for attackers to succeed.
Telling users to ‘avoid clicking bad links’ still isn’t working
The AI has delivered the news.
The following question was used to generate the response from Google Gemini:
At 2025-03-13 11:22, ‘Telling users to ‘avoid clicking bad links’ still isn’t working’ was published according to UK National Cyber Security Centre. Please write a detailed article with related information in an easy-to-understand manner.
36