SKIP TO PAGE CONTENT
Visit / Apply / Give

Phishing Awareness: Don’t take the bait...

Hackers Are Trying to Trick You

Email is one of the most common ways hackers try to steal information. Many data breaches begin with phishing—fake messages designed to look like they come from trusted sources.

These messages may try to get you to:

  • Click a malicious link
  • Download an infected attachment
  • Share personal or account information

How to Recognize Phishing

Watch for these common warning signs:

Suspicious Emails

  • Unknown or unusual sender addresses
  • Misspelled or fake domains (e.g., paypall.net)
  • Generic greetings like “Dear User”
  • Poor grammar or unusual formatting
  • Unexpected attachments or vague file names

Urgent or Manipulative Messages

  • Pressure to act immediately
  • Threats (account suspension, penalties)
  • Requests for passwords or personal information
  • Unexpected password reset or MFA requests
  • Offers of money, prizes, or help

Before You Click

Take a moment to verify:

  • Check the sender’s email address carefully
  • Look closely at links before clicking
  • Confirm requests using a trusted contact method
If something feels off, don’t click.

What to Do If You Suspect Phishing

  • Do not click links or open attachments
  • Do not reply to the message
  • Report the email to the Office of Information Technology Services
  • Verify requests by contacting the sender directly

Think You Clicked Something?

Act quickly:

  • Reset your password immediately
  • Change passwords on any accounts using the same login
  • Monitor your accounts for unusual activity

How Phishing Scams Work

Phishing emails often look like they come from trusted organizations. They may link to fake websites designed to steal your information or install malware on your device.