Skip to content

How to check if a link is safe?

Imagine: a newsletter of an online shop you like drops in your inbox’s spam folder. You open it anyway—after all, it’s not unusual for these emails to be incorrectly marked as spam. Not all components are loading as they should, but it looks convincing enough for you to open the link to see more. Once on the page, you sense something’s off. You take a closer look at the URL bar and realize this uncanny valley feeling is not unwarranted—it’s similar enough, but not the actual website. You’ve accidentally ended up clicking on a scam link.

Creating a spoof website remains a popular phishing technique among cybercriminals, and it can, unfortunately, convince unsuspecting users to give up their sensitive information themselves. Let’s learn how to check if a link is safe before clicking it to dodge such scams and stay safe online.

It’s really simple—by opening an unsafe link, you risk your digital safety and put your private data at risk. Scam links are a prominent tool in phishing campaigns. Their goal is to get you to inadvertently reveal valuable personal information yourself. Phishy links aim to trick the user by imitating a reliable service. By the time you realize the website you visited wasn’t real, your data may already have made its way to the dark web.

Scam link campaigns try to toy with the users’ emotions and rationale. They often build a sense of urgency, for example, by convincing the user that there’s a problem with an account or a transaction. Likewise, they want to build trust with the target by imitating the service the user would otherwise believe to be real.

Your login details are valuable to scammers for a few reasons. One, they can sell credentials in bulk on the dark web for profit. Two, users still often reuse the same password for multiple accounts, meaning that breaching one can open the doors to many others, including governmental, medical, or banking accounts.

Speaking of banking, scam sites frequently replicate e-commerce pages, as fake purchases allow hackers to collect users’ payment information, like credit card numbers. They can then use this data in financial scams, like falsified tax returns or money laundering.

Personal addresses can also be stolen via scam sites, allowing hackers to spam not just your digital inbox, but your physical mailbox as well. Your address can then be falsely used to register fraud companies or to forge your identity online.

Malware is another risk you can run into when you’re faced with a scam link. Websites have different interactive elements that, once clicked, can download a file on your device. It’s an easy way for cybercriminals to infect your computer with malware like a Trojan virus, steal your data, install a keylogger, or cryptojack your device.

Overall, scam sites can wreak havoc on the security of your personal data. Learning to spot scam links and avoiding them altogether is a surefire way to keep your identity secure both online and in the real world.

While the emergence of AI has made it more difficult to tell scam sites apart from legitimate ones, there are some telltale signs that they’re built with nefarious intentions.

The scam domain is often very similar to the actual page. It might use extra dashes and a subdomain to confuse the user. If the scam link leads to a mobile app, it might copy the logo and name of the service as well, replacing a few characters or making it appear more generic to avoid getting flagged by app store algorithms.

Not all scam links are overtly similar to their “inspirations.” Often, scammers use shortening services to create a custom coy link that does not immediately reveal the domain or allow the user to guess where it might lead. Such links can spoof parcel tracking sites, discount codes, and similar, more personalized offers and services.

Just clicking on a scam website does not mean that your device has been immediately hacked or that your data has been stolen. Such websites usually require you to perform actions yourself, like entering your login credentials, downloading a file, or connecting to a cloud account, before they can do any real damage. This means you have time to investigate the website to determine whether it’s legitimate or not.

If you’re suspicious about a URL, there are a few ways to check whether it’s safe to open. It’s pretty easy to analyze the link yourself without opening it.

  • Check browser history

    If it’s a site you’ve visited before, you can copy and paste the URL into your browser’s search bar or history to see if it finds any previously visited matches.

  • Hover over the link

    If the link is embedded in a text like “Click here” or “Log in,” you can hover over it with your mouse to preview the URL, or right-click and copy it. Then, paste it safely into an empty document to get a better look at the domain.

  • Compare with a legitimate link

    Likewise, you can take both the suspicious URL and the legitimate one, paste them into the same file, and compare the characters. Hackers are likely to use tricks like replacing the letter O with a zero or using a lowercase L instead of an uppercase i to trick the user. If the link is a match, proceed as usual. If not, you can run it through a deeper check.

  • Use a link-checking tool

    You can use a dedicated website that scans a URL and sees if it’s safe. For instance, NordVPN’s Link Checker scans the URL for any malware or phishing threats and warns you if the link is unsafe, protecting you from a potential cyber incident. You can also attempt to find the site’s domain information to see if the registration is recent or matches the legitimate service’s data.

  • Look for the HTTPS protocol

    Although it’s not recommended to open suspicious links, if you’ve done so, look at the protocol part of the URL. If you don’t see HTTPS at the beginning of the link, the site is not using a secure protocol, and your data is not being encrypted. You should close such a website immediately.

Checking whether a link is safe is a lot easier on a desktop—you can see the link preview on the browser, quickly check the security protocol, and even close the tab with a simple keyboard shortcut instead of a mouse click. With smartphones, matters are a little more fickle.

Links sent to a phone can be harder to copy, depending on app restrictions. The touchscreen also makes it harder to close or leave a suspicious link without accidentally pressing an interactive part of the screen. If the website contains pop-ups, closing them can also be a tough battle to win. Here’s how to check whether a link is legit to stay safe while browsing your phone.

For iOS phones, Safari offers a tool that alerts you if you attempt to visit a scam page. To use it, go to your phone settings, find “Safari,” and switch on “Fraudulent Website Warning.”

If you’re using an Android device, you can activate secure browser settings:

  1. Go to your device settings and find the “Security and privacy” category.

  2. Select “More security settings.”

  3. Select “Android Safe Browsing” and toggle on “Use live threat detection.”

Here’s some good news—simply clicking on the link doesn’t necessarily mean damage has been caused. Scam URLs are usually just one step of the process. Nevertheless, if you think you’ve opened a phishy site, act with caution.

If you opened the website

If you’ve opened a link and can clearly tell it’s a scam, close the tab immediately and delete it from your browser history to avoid accidentally reopening it. Alternatively, open the link using an incognito tab. This prevents the site from potentially accessing your personal data and keeps it from appearing in your history.

Make sure you don’t click anything on the site—even if you avoid the obvious interactive buttons, other design aspects and the empty background space might have been deliberately developed to be interactive. Do not enter any personal information, like login credentials, address, or payment information.

If the website prompted you to log in and you entered your credentials, make sure to change your password on the real site immediately. If the account did not have multi-factor authentication activated yet, consider switching it on. That way, even if the cybercriminals have taken your personal details, you will lower the chances of them overtaking your account.

If you downloaded a file

If the website caused you to download a file and you could not stop the download process, do not open it. Instead, delete the file from your device permanently. The file may contain malware that could infect your computer and gain access to your data. As a precaution, scan your device using antivirus software even after you’ve deleted the file.

Getting ahead of the fallout

Keep an eye on potentially breached accounts for the foreseeable future in case of suspicious activity or misuse. If you happen to use the same password for other accounts, update those login details as well. Make sure you use new and unique passwords for each account—you can easily do this with a password generator.

A good course of action is to contact the legitimate service provider to let them know about the scam. That way, criminal activities can be detected faster, and you can protect yourself and others from falling prey.

Staying secure online

Suspicious links are a sneaky online threat—they’re easy to overlook, but falling for them can have huge consequences for your personal data. So, make sure you stay alert, master the art of dodging insecure links, and get a few tools to help you keep your data secure even if a cybercriminal tries to target you, starting with a password manager.

NordPass is an intuitive password manager that ensures your login credentials are safe and only autofills them for you when it recognizes you’re on the right website. So, if you’ve got your bank password saved on NordPass and a scammer tries to get you to log in to a fake banking site, you won’t automatically log in by accident.

NordPass allows you to generate and store strong and unique passwords for your new and existing accounts, letting you quickly update any login credentials that might have been compromised. You can also use the Data Breach Scanner to check whether your password or credit card details have appeared on the dark web and take action to update your old credentials.

Sharpen your awareness of digital scams and keep your data safe with NordPass.

About NordPass
NordPass is developed by Nord Security, a company leading the global market of cybersecurity products.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Improving Backup Performance

When it comes to backup performance, every little detail counts. Unfortunately, some companies tend to oversimplify the discussion, focusing only on a handful of key factors. The reality is much more complex, and ignoring the finer points can put data protection at risk.

In a previous article (“Efficient Backup: Ready for the Black Scenario“), we explored backup methods, the importance of RTO and RPO, and the differences between data storage and backup. But that was just the tip of the iceberg. Now, let’s dive deeper and examine how storage media, network throughput, and data reduction mechanisms impact backup performance. What should you consider when choosing the best solutions for your business?

Storage Media: A Tough Choice

Not long ago, using SSDs in NAS systems (often used for backups) seemed unnecessary. Today, almost every NAS device supports them. One of the loudest voices advocating for ditching traditional hard drives is VAST Data, a U.S.-based company specializing in large-scale data management. Their solution relies entirely on flash storage, offering archive-level data retention at a cost comparable to HDDs. With proprietary technology that extends SSD lifespan to up to 10 years, their systems reduce the need for multiple devices to store and protect data. Perhaps in the future, businesses won’t have to choose between HDDs and SSDs – but for now, that decision still matters.

Flash storage significantly boosts backup performance. For example, a standard SATA SSD can be twice as fast as a mechanical SATA hard drive, while NVMe SSDs can outperform HDDs by a staggering 35 times. That’s a game-changer. Yet, many businesses still favor HDDs due to their lower cost. At the start of 2024, a 1TB NVMe PCIe 5 SSD cost around $150 – the same price as an 8TB HDD.

With the growing demand for storage-driven by explosive data growth and backup best practices (3-2-1, 4-3-2, 3-2-1-1-0) – choosing the right media is critical. Many experts argue that hard drives remain more reliable and predictable, while SSDs, despite improvements, can still experience unexpected failures.

But HDDs and SSDs aren’t the only options. Tape storage remains in play, offering a much cheaper alternative to HDDs for long-term archival. However, HDDs are far superior for short-term storage and incremental backups. Speed is also a factor – HDDs provide faster data access compared to tape, where retrieving data can take minutes due to loading and rewinding times. Restoring a large file system from 30 tapes could add up to two hours of delay, whereas HDDs work instantly.

Read more about Data Storage:

Network Throughput: The Silent Bottleneck

Backup performance isn’t just about storage; network speed plays a huge role, too. If backups run multiple times a day, high bandwidth is essential. But if backups occur less frequently – say, once a week or only after hours – the network load is lower. To pinpoint bottlenecks, companies should analyze their network’s data transfer speed. A simple formula can help:

Backup Data Size / Backup Window (time allocated for backup without disrupting operations)

For instance, backing up 5TB of data within a six-hour window requires a network capable of transferring 853GB per hour (5,120GB / 6 hours). On a Fast Ethernet (100Base-T) network, transferring 250GB takes about an hour, whereas a Gigabit Ethernet (1000Base-T) network is ten times faster. In this case, Fast Ethernet won’t cut it.

To improve network performance, businesses can:

  • Extend the backup window
  • Use dedicated high-speed networks
  • Upgrade to Gigabit Ethernet
  • Optimize data through compression and deduplication

Slimming Down Data: Deduplication & Compression

With data storage costs on the rise, companies are turning to compression and deduplication to reduce backup sizes.

Compression comes in two types:

  • Lossy: Removes unnecessary data (e.g., reducing image quality slightly)
  • Lossless: Keeps all data intact, essential for text files, executables, and spreadsheets

For example, a 50MB file with a 2:1 compression ratio shrinks to 25MB. However, compression can reduce network throughput while processing data. While a small quality loss in compressed images may go unnoticed, it matters for high-resolution projects.

Deduplication, on the other hand, prevents redundant data from being stored multiple times. It scans, divides data into blocks, and saves only unique ones.

A key metric here is the deduplication factor, which is often misunderstood. If a solution advertises a 10:1 deduplication factor, it doesn’t mean twice the reduction compared to 20:1. Instead, the percentage of data saved follows this formula:

% Data Reduction = 1 – (1/DD) x 100%

  • 10:1 Deduplication: 90% data reduction
  • 20:1 Deduplication: 95% data reduction

The difference between a 10:1 and 20:1 factor is only 5%, not double the savings as some assume.

Performance Optimization: It’s All About Balance

Reducing backup sizes is a smart move, but it must align with broader data protection strategies. Think of it like fuel efficiency in a car: a vehicle might have great mileage, but if the driver has bad habits – like underinflated tires or carrying unnecessary weight – it will still waste fuel.

The same principle applies to backup performance. Every component – from media type and network speed to compression and deduplication – affects the overall efficiency. The key is balancing cost, speed, and reliability to ensure optimal data protection.

By understanding these details, businesses can make smarter backup decisions—without sacrificing performance or security.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×