⚠️ How to Safely Check Email Links Before Clicking

⚠️ How to Safely Check Email Links Before Clicking



Important: How to Safely Check Email Links

Protecting Vantage Apparel from Phishing and Credential Theft


📌 Overview

Email is a primary communication tool for our business—and a common attack vector for cybercriminals. As a distributor of promotional products, we often receive purchase orders, art files, and product images via email with attached documents or shared links. While Microsoft 365 security features help block most obvious threats, malicious links often appear harmless at first and may only become dangerous after a redirect or during login prompts.

To maintain cybersecurity hygiene, all employees should follow link validation steps before clicking any link in an email—even from known contacts.


🧠 Why It Matters

Attackers can:

  • Use lookalike domains or fake sender names (e.g., mypromooffice.com vs. mypromo0ffice.com)

  • Send links that initially load a safe-looking site, but then redirect to phishing pages

  • Embed credential stealers behind legitimate-looking requests (e.g., “View Sample Order” or “Download Art File”)

Even HTTPS links (secure connections) can still host malicious content. That’s why multiple checks—technical and contextual—are essential.


✅ Step-by-Step Instructions

1. Hover, Don’t Click

  • Hover your mouse over the link (don’t click).

  • Look in the lower-left of your screen or tooltip to see the actual destination URL.

  • Validate that it:

    • Begins with https://

    • Matches the sender's company and purpose

    • Contains no misspellings or suspicious extra characters


2. Copy and Inspect the Full Link

  • Right-click the link and choose “Copy link address”.

  • Paste it into Notepad or TextEdit to see the full, raw URL.

  • Be cautious of:

    • Shortened URLs (e.g., bit.ly, tinyurl)

    • Unexpected file types (e.g., .exe, .scr)  - NEVER CLICK on this types of links.

    • Overly complex strings that don’t match your expectations


3. Use a Trusted Online Link Checker

If you're unsure, use one of the following free tools to scan the link before clicking:

Website Name URL Function Notes
VirusTotal https://www.virustotal.com/gui/home/url Scans URLs with 70+ antivirus engines Clean results ≠ guarantee; use context
URLVoid https://www.urlvoid.com/ Checks domain against 30+ blacklists Great for spotting historically malicious domains
Google Safe Browsing https://transparencyreport.google.com/safe-browsing/search Reports if Google sees the site as dangerous May not show recent or highly targeted threats

4. Check the Email Context

Always evaluate the email itself for red flags:

  • Sender's name and domain (look for slight misspellings or impersonation)

  • Unexpected or urgent language (“ASAP”, “Click now”, “Immediate response needed”)

  • Spelling/grammar errors - With AI this advice is no longer valid. 

  • Unusual attachments or shared drives not typically used by the sender


đŸš© If in Doubt, Don’t Click

  • Forward suspicious emails to PCSupport@VantageApparel.com

  • DO NOT open links or attachments you are unsure about

  • If urgent, call the sender using known contact information—not the number in the email.


🔐 Final Reminder

Even with advanced security systems in place, individual vigilance is the final line of defense. By hovering over links, checking for HTTPS, validating full URLs, and using scanner tools, you help prevent attacks that could compromise your data, your credentials, or our company’s systems.

Stay alert. When in doubt—ask IT.



    • Related Articles

    • Best Practices for Computer Security, Longevity, and Power Efficiency

      To protect our devices and data, as well as to ensure optimal performance and longevity, please follow these essential guidelines. Following these will help you work securely and keep your computer performing at its best. General Best Practices for ...
    • iPhone Email Setup

        | Open mail App.   |   | Choose Microsoft Exchange .   | Enter your email address and a Description .   | Choose Next .   | If you get this message Choose Sign In.   |   | Enter your password and choose Next.   | If you get this message choose ...
    • How to Check and Release Legitimate Emails from Outlook Online Junk Folder and MS Exchange Quarantine

      Purpose: This article provides instructions for Vantage Apparel employees on how to effectively manage and release legitimate emails that have been mistakenly placed in the Outlook Online Junk Folder and Microsoft Exchange Quarantine. Scope: This ...
    • How to Handle Extortion Emails Safely

      We recently received a report of an extortion email, which claims unauthorized access to your computer or private data and attempts to coerce payment. These types of emails are scams designed to instill fear and provoke a response. Please follow the ...
    • How to check and submit Fanatics ASNs in Impress

      How to check and submit Fanatics ASNs in Impress Run Shipping report Select Fanatics Shipping Report version Add Shipment Created Date ( depending on when you are doing it, it might be today or yesterday) Save to CSV, print Once excel opens sort by ...