Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Service Catalog
Search the client portal
Search
Sign In
Show Applications Menu
Student IT Service Center
Sign In
Search
IT Service Center (Students)
Services
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Blank
Knowledge Base
Microsoft 365 (Email & More)
How to Identify a Suspicious Email (Phishing)
How to Identify a Suspicious Email (Phishing)
Tags
email
phishing
Phishing
is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's device like ransomware.
Phishing emails come in many forms. We’ve focused on emails in this article, but you might also get scam text messages, phone calls or social media posts.
Identifying a Suspicious Email or Message
Do you trust the person or organization the email was sent from?
If the answer is "No," then delete the email.
Does the sender's email have a mis-spelt domain name or does a link have a misspelled domain name or look suspicious?
If the answer is "Yes", it is most likely a phishing attempt.
Does the email have an attachment?
If the answer is "Yes," :
Only open attachments from senders you trust.
Were you expecting the attachment?
Is the attachment password protected?
Always be cautious with email attachments when deciding whether or not to open them.
Does the email have grammar/spelling errors?
If the answer is "Yes," that is often a key indicator that the email is suspicious.
Does the email or message try to create a sense of urgency?
The more urgent the message or email, the more likely the sender is trying to scare you into clicking or opening something you should not.
Sign in to leave feedback
0 reviews
Blank
Blank
Blank
Blank
Print Article
Details
Article ID:
7208
Created
Tue 7/5/22 12:31 PM
Modified
Wed 7/6/22 7:35 AM
Deleting...
×
Share
Recipient(s)
- separate email addresses with a comma
Message
Press Alt + 0 within the editor to access accessibility instructions, or press Alt + F10 to access the menu.
Check out this article I found in the Student IT Service Center knowledge base.<br /><br /><a href="https://tridenttech.teamdynamix.com/TDClient/550/StuPortal/KB/ArticleDet?ID=7208">https://tridenttech.teamdynamix.com/TDClient/550/StuPortal/KB/ArticleDet?ID=7208</a><br /><br />How to Identify a Suspicious Email (Phishing)<br /><br />This article explains how to identify what to do with and how to identify a suspicious/malicious email, otherwise known as a phishing attempt.