Phishing Awareness: Don’t take the bait...
Hackers Are Trying to Trick You
Email is one of the most common ways hackers try to steal information. Many data breaches begin with phishing—fake messages designed to look like they come from trusted sources.
These messages may try to get you to:
- Click a malicious link
- Download an infected attachment
- Share personal or account information
How to Recognize Phishing
Watch for these common warning signs:
Suspicious Emails
- Unknown or unusual sender addresses
- Misspelled or fake domains (e.g., paypall.net)
- Generic greetings like “Dear User”
- Poor grammar or unusual formatting
- Unexpected attachments or vague file names
Urgent or Manipulative Messages
- Pressure to act immediately
- Threats (account suspension, penalties)
- Requests for passwords or personal information
- Unexpected password reset or MFA requests
- Offers of money, prizes, or help
Before You Click
Take a moment to verify:
- Check the sender’s email address carefully
- Look closely at links before clicking
- Confirm requests using a trusted contact method
What to Do If You Suspect Phishing
- Do not click links or open attachments
- Do not reply to the message
- Report the email to the Office of Information Technology Services
- Verify requests by contacting the sender directly
Think You Clicked Something?
Act quickly:
- Reset your password immediately
- Change passwords on any accounts using the same login
- Monitor your accounts for unusual activity
How Phishing Scams Work
Phishing emails often look like they come from trusted organizations. They may link to fake websites designed to steal your information or install malware on your device.