Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Forward suspected spam and phishing emails to security@umbc.edu or use UMBCHelp@rt.umbc.edu to submit a ticket.

...

Excerpt

To spot phishing emails, look out for the following:

  • Unexpected messages making unexpected requests

    • Does this email or direct message come from an unfamiliar sender who claims to know you, or a friend who you have not spoken to in a long time? Does the list of recipients contain people you don’t know or talk to? This is particularly true if the message asks for money or personal information.

  • An offer that’s “too good to be true”

    • It probably is, especially if important information like an employer’s address or a product’s shipping information is nowhere to be found.

  • Phishy Links and Email Addresses

    • Hyperlinks and sender emails appear to correspond to known domains and people, but something, sometimes a single letter, has been changed. This may require close examination; look for misspellings, dashes, or other deviations from what seems to be a legitimate domain

  • An email requests your password, your credit card number, or other sensitive information

    • Email is never secure for sharing this information, and most trusted services should already have it. On sites which ask you to provide personal information, like your credit card, look for “https” in the address bar to ensure the site is secure.

  • An urgent tone

    • If the sender says you must act now, uses fancy jargon or other intimidating language, ask yourself why.

  • Something “off”

    • Phishing emails often have an impersonal, awkward, unprofessional, or out-of-character tone. Many, but not all, phishing emails contain conspicuous typos, bizarre capitalization, or numbers used in place of letters.

  • A prompt to open an attachment or follow a link

    • Critically examine any email with an attachment, especially an unexpected one. If the link prompts you to “Sign In,” to an account, be extra suspicious. Do not “enable Macros” or allow similar permissions for attachments you do not trust.

...