No, don’t click on that link!

Don't click on that link

While many of us are technologically savvy and can instantly recognize an email or internet scam, there is a vulnerable population that can’t. Here’s a story for my 86-year-old grandmother and the rest of the internet users who aren’t familiar with the nefarious threats lurking online, but should be.

Maybe you know someone like my grandmother, Marcy. She is trying her best to join the 21st century but is frequently bewildered by it. When she receives an email telling her that it is important to click a link, she assumes that it is important to click that link.

Elliott Advocacy is underwritten by Mediacom Communications. The nation’s fifth-largest cable operator, serving the smaller cities and towns in the Midwest and Southern regions of the United States. We are a high-performance broadband, entertainment, and communications company that brings the power of modern technology and quality customer experience to life inside the connected home by combining ultra-fast gigabit speeds with personalized local and over-the-top entertainment choices that fit your lifestyle. Details at

Why else would they be asking her to do such a thing?

Online phishers want you to click on those links

If you get an email like that, you probably know better than to click on that link. You know that they are “phishing” for information. But my grandmother doesn’t.

The Federal Trade Commission explains phishing on its website:

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don’t reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either — even if the message seems to be from an organization you trust. It isn’t…

And this is part of the problem. In a tactic called email spoofing, these emails can further confuse the receiver by appearing to come from a trusted source; such as Dell, Microsoft, Walmart, or your bank. Sometimes, these emails may even appear to be coming from a friend. It is not difficult for internet phishers to change the email address of the sender.

A typical phishing email might warn that “your computer is compromised. It is necessary to download this upgrade immediately. If you do not download this upgrade, your computer will be open to attack.” Of course, this type of message can be intimidating for someone unfamiliar with these types of scams.

Recently, we received this very type of email to our Elliott Advocacy help line. While we did not click on the link, it spurred this story to warn others about this type of internet trickery.

Click the link and a variety of things happen next

But, unfortunately, when my grandmother receives that type of email, she does click the link.

Then one of a variety of things happens.

If she is lucky, the link just takes her to a web page advertising a product that she has no interest in. But what usually happens is that some type of malware is suddenly downloaded to her computer.

Malware is not one specific thing, but refers to an endless number of programs that can be downloaded to your computer without your knowledge. These programs are designed to steal your personal information and use it for some unknown entity’s benefit. In fact, our own site is often hit by malware attacks by unidentified entities who are determined to shut us down.

Signs that a computer is infected

There are some common signs that a computer has been infected with malware, but the most prominent sign is usually that the computer becomes very slow. You may notice that the computer takes an inordinate amount of time to start up or to open programs.

The Federal Trade Commission maintains an extensive and constantly updated list of email/phishing scams that you may encounter on the internet. This is a great warehouse of information that offers both text and video explanations, in English and Spanish, of all the currently known ways that scammers are trying to break into your computer and steal your personal information.

Some of the more convincing scams can first involve a phone call. I recently received a phone call from a man who said he was calling from what sounded like Microsoft. He told me that my computer had been identified as corrupt. He explained that he needed remote access to my computer to fix this “very serious problem — that is not just affecting you, but is interfering with the mainframe.”

This sounded very serious, indeed.

Although I knew this was a scam, I was curious and asked him to spell the name of his company. He quickly spelled this: “MICROSOF.”

I declined his offer of “help” and hung up. But I immediately thought of my grandmother. I knew that this type of call could result in her allowing access to her computer. These scammers need technologically confused victims to succeed.

Microsoft has addressed this particular scam on its website. They point out that Microsoft will never contact you via phone asking for access to your computer.

What can you do if you’ve clicked that link and compromised your computer

So, what can be done once your computer (or your grandmother’s) has been compromised?

  • Change every password that has been stored in the computer.
  • Make sure that there is an up-to-date antivirus protection program installed and running.
  • If you believe that someone is currently remotely accessing your computer, it is vital to disconnect the computer from the internet immediately.
  • The FTC also recommends that you file a complaint at [email protected] to report suspicious emails and calls.

It’s important to note that the internet and all its components can be mystifying at times, and a person’s struggle with it is not a reflection on their intelligence.

We are all fighting a constant battle against internet treachery. The methods of internet scammers are always changing; so maintaining an awareness of their evolution is vital. To stay on top of this problem, I do recommend perusing the Federal Trade Commission’s library of scams. These short videos are informative, entertaining and interactive.

I have encouraged my grandmother to watch some of these, and she has been amazed by all the ways internet invaders can reach into her computer. And each day, she is becoming more tech-savvy and a more confident internet user. For a lady born long before the age of the internet, this is a big accomplishment.

You’ve come a long way, Marcy.