eSafety 101
Published on
Start hereDigital safety basics · Part 1

Online Safety Starts With Pausing

Quick read

For everyone

Main point

Main point: scammers want you to rush. Your first defence is to pause before you act.

Before you click a link, open an attachment, send money, share a code, or give out personal information, stop for a moment and ask:

  • Was I expecting this?
  • Does this feel right?
  • Can I check it another way?

You do not need to be a technical expert to be safer online. A short pause can give you enough time to notice warning signs.

A little deeper

For curious readers

Context

Many scams work because they create pressure.

A message might say your account will be closed, a payment has failed, a parcel cannot be delivered, or someone you care about needs urgent help.

When we feel rushed, worried, excited, or embarrassed, we are more likely to make quick decisions. Scammers know this. They design messages and calls to push you into acting before you have time to think.

Pausing does not mean ignoring everything. It means slowing the situation down enough to check it properly.

A safer habit:

  • Stop before clicking links or opening attachments.
  • Read the message carefully.
  • Ask whether you were expecting it.
  • Check the sender, phone number, email address, or website.
  • Verify the request using a separate trusted method.
  • Talk to someone you trust if money, passwords, or personal details are involved.

A scammer may try to make pausing feel dangerous. They might say you must act immediately or you will lose access, miss out, be fined, or get into trouble.

That pressure is itself a warning sign.

Technical notes

For confident users

Technical

Pausing is effective because many online scams depend on social engineering rather than technical hacking. The attacker is trying to influence the person, not just the device.

Common pressure techniques include urgency, authority, scarcity, fear, curiosity, financial opportunity, and emotional manipulation. These techniques are used in phishing emails, SMS scams, phone impersonation, fake invoices, marketplace scams, romance scams, and account takeover attempts.

A practical safety model is to treat unexpected requests as untrusted until verified.

Verification should happen through a separate trusted channel where possible. For example, if you receive a suspicious bank message, do not use the link or phone number in the message. Open your banking app directly, type the bank’s website into your browser, or call the number printed on your card.

The goal is not to become suspicious of everything. The goal is to avoid letting someone else control the speed of your decision.

Disclaimer: All content on this website is general in nature and is not in any way advice. While we strive to ensure the accuracy and relevance of the content, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability, or availability with respect to this website or the information, products, services, or related graphics contained on the website for any purpose. Therefore, any reliance on such information is strictly at your own risk.

In no event will we be liable for any loss or damage, including, without limitation, indirect or consequential loss or damage, or any loss or damage arising from loss of data or profits arising out of, or in connection with, the use of this website. Through this website, you can link to other websites that are not controlled by this website. We have no control over the nature, content, and availability of those sites. The inclusion of any links does not necessarily imply a recommendation or endorse the views expressed within them.