Telling users to ‘avoid clicking bad links’ still isn’t working, UK National Cyber Security Centre


Clicking Danger: Why “Don’t Click Bad Links” Still Isn’t Enough (And What You Can Do About It)

The UK’s National Cyber Security Centre (NCSC), in a blog post published on March 13, 2025, reaffirmed a frustrating truth: simply telling users “avoid clicking bad links” isn’t working. Despite years of warnings and training, people are still falling victim to phishing scams and malicious links, leading to data breaches, financial losses, and a whole lot of headaches.

So, why isn’t this basic advice sticking? And more importantly, what can be done to improve our collective cybersecurity?

The Problem: Why “Just Don’t Click” Fails

The NCSC’s post likely highlights several key reasons why relying solely on user caution is insufficient:

  • Sophistication of Attacks: Cybercriminals are getting smarter. Their phishing emails and malicious websites look increasingly legitimate, mimicking real brands and using sophisticated techniques to bypass spam filters. They’re masters of social engineering, exploiting emotions like fear, urgency, and even curiosity to trick users into clicking. Imagine a fake email from your bank urgently asking you to update your security details, or a link promising a free trip. These are much harder to resist than the poorly-written scams of the past.

  • Human Nature: We are inherently trusting and prone to making mistakes, especially under pressure or when multitasking. Even the most security-conscious individuals can have a lapse in judgment, especially when faced with a cleverly crafted phishing attack. Fatigue, stress, and distractions all contribute to our vulnerability.

  • Lack of Context: Simply telling someone “avoid bad links” is vague. What does a “bad link” look like? How can users distinguish a legitimate website from a fake one? Without clear guidance and practical examples, the advice is practically useless.

  • Technology’s Role: We’re constantly bombarded with links – in emails, social media, instant messaging, and even QR codes. The ease of clicking creates a culture where we often don’t stop to think before we do. Furthermore, shorter URLs (like those from link shorteners) obscure the true destination, making it harder to assess the link’s legitimacy.

  • Responsibility Shifting: Solely blaming the user shifts the responsibility away from the organizations that should be implementing robust security measures. It’s like telling someone to avoid getting hit by a car but not providing them with sidewalks or traffic lights.

What Can Be Done: A Multi-Layered Approach

The solution isn’t to just keep repeating the same ineffective advice. Instead, we need a multi-layered approach that combines user education with technical safeguards:

  • Enhanced User Education:

    • Practical Training: Go beyond generic warnings. Provide realistic scenarios and simulations to train users to recognize phishing attempts.
    • Focus on Context: Teach users to look for red flags, such as:
      • Unusual Sender Addresses: Does the email address match the company’s official domain?
      • Poor Grammar and Spelling: Legitimate organizations typically have meticulous communication standards.
      • Urgent or Threatening Language: Scammers often use emotional manipulation to rush you into action.
      • Suspicious Attachments: Be wary of unexpected attachments, especially those with unusual file extensions.
      • Mismatching Links: Hover over the link before clicking to see the actual URL. Does it match the expected destination?
    • Regular Refreshers: Cybersecurity threats evolve constantly. Regular training and awareness campaigns are crucial to keep users up-to-date.
    • Encourage Reporting: Create a culture where users feel comfortable reporting suspicious emails or links without fear of blame.
  • Technical Solutions:

    • Advanced Email Security: Implement robust email security solutions that can filter out phishing emails and malicious attachments.
    • URL Filtering: Use URL filtering software to block access to known malicious websites.
    • Multi-Factor Authentication (MFA): Add an extra layer of security to accounts, making it harder for attackers to gain access even if they obtain login credentials.
    • Endpoint Detection and Response (EDR): EDR systems can detect and respond to malicious activity on individual devices, even if a user clicks a bad link.
    • Regular Security Audits and Penetration Testing: Identify and address vulnerabilities in systems and networks before attackers can exploit them.
    • DNS Filtering: Use DNS filtering to prevent users from accessing websites known to host malware or phishing scams.
  • Building a Culture of Security:

    • Leadership Buy-in: Security should be a priority at all levels of the organization, with strong leadership support and investment.
    • Open Communication: Encourage open communication about security threats and best practices.
    • Continuous Improvement: Regularly review and update security policies and procedures to adapt to evolving threats.
    • Focus on Prevention: Shift the focus from reactive responses to proactive prevention.

Conclusion

The NCSC’s reminder that “telling users to avoid clicking bad links” isn’t working is a wake-up call. We need to move beyond simplistic advice and embrace a more comprehensive approach that combines user education, technical safeguards, and a strong culture of security. By working together, we can significantly reduce the risk of falling victim to phishing attacks and other malicious online threats. It’s not about blaming the user; it’s about empowering them with the knowledge and tools they need to stay safe online. Only then can we hope to turn the tide in the ongoing battle against cybercrime.


Telling users to ‘avoid clicking bad links’ still isn’t working

The AI has delivered the news.

The following question was used to generate the response from Google Gemini:

At 2025-03-13 11:22, ‘Telling users to ‘avoid clicking bad links’ still isn’t working’ was published according to UK National Cyber Security Centre. Please write a detailed article with related information in an easy-to-understand manner.


69

Leave a Comment