This article gives you information about phishing emails, spam messages, and how to report them.
Some emails are sent to try to trick you into revealing passwords, or other information about yourself such as bank details. We call this process Phishing.
Phishing emails often contain links to websites that are infected with malicious software (called “malware”). Hackers use them to gather sensitive information such as passwords.
Malware such as computer viruses can also be used to:
Email or instant messaging, purporting to be from popular social networking websites, auction sites, online payment sites or IT administrators are commonly used.
The University will never need your password, so you should not give it to anyone even if they ask.
If necessary, the university can ask you to take action on your password by doing a rest or making changes. This request will be announced in advance on:
Phishing emails may feature some of the following warning signs:
If you click on a link in a phishing email, you may be taken to a fake website. It will try to get you to input personal information such as:
This information could be used to commit theft and fraud using your identity.
If you have received a phishing or scam emails, please:
If you have responded to the message in any way, or clicked on links in it, you should change your University account password as quickly as possible using Subscribe.
Use the following form if you want to notify Information Security about a security concern that may affect University systems: Security concerns.
Information Security will use this information to carry out any necessary risk assessments, and to assist with any remediation, if applicable.
---
Spam is digital junk mail and unsolicited communications sent in bulk through an electronic messaging system.
Spam messages are:
Often spam is sent via email, but it can also be distributed via:
---
When you receive an email message that is malicious or not genuine, it is important to report it. Reporting these messages allows Microsoft to review the message and improve its filtering to prevent them from getting through in the future.
iSolutions will also receive a copy of the messages for our own independent review.
1. As soon as you open a suspect email on Outlook, please select the "More actions" button (three dots in a row)
2. The list of available options will appear. Please select the option "Report Message"
3. A new menu will appear. You can use it to report a message as junk or phishing: please select the option "Report phishing"
4. Our Cyber Security team will receive your report and investigate
1. As soon as you open a suspect email on Outlook, go to the ribbon and select the icon “Report Message”
2. The list of available options will appear. Please select the option "Phishing"
3. Our Cyber Security team will receive your report and investigate
1. As soon as you open a suspect email on Outlook, please select the button "Report Message" from the ribbon. You can find it close to the button "Sync" or by selecting the "..." button (called "See more items")
2. From the drop-down menu, please select the option "Phishing":
3. Outlook will notify that the message has been marked as phishing and will be moved to the Deleted Items folder
4. Our Cyber Security team will receive your report and investigate
If the text message is from an unknown sender, or from a sender you are not familiar with, we recommend you do not reply.
Responding to the text will confirm that your number is active and might actually result in you receiving more messages, or even voice calls.
Instead, you may report the text to your network operator. To report a spam text forward the text to 7726. You may get an automated response thanking you for the report and giving you further instructions if needed.
You will not be charged for sending texts to 7726.
An easy way to remember ‘7726' is that they are the numbers on your telephone keypad that spell out the word ‘SPAM'.
---
Business email compromise: dealing with targeted phishing emails
Microsoft Report Message add-in (external website)
Think before you click: Check your information
Attached files:
Was this article helpful?
If you have any further comments, please put them below.
Please note that feedback is anonymous - if you require a reply or assistance, please raise a ticket via ServiceLine.
Thank you for your feedback, it is much appreciated.