Thompson Rivers University
Thompson Rivers University

Recognizing Phishing E-mails

Phishing e-mails are becoming more sophisticated and can be tricky to spot. Being able to recognize phishing e-mails can help prevent you from becoming a victim.

Below is an example of a phishing e-mail with some common things to help identify them.

Phishing Guide

A closer look at phishing emails

A closer look at phishing emails.

If you believe you may have provided confidential information in response to a phishing e-mail, call us immediately.

IT Service Desk - 250-852-6800 or email:
Information Security Office - 250-852-6351 or email:

Follow these tips to avoid being a victim to phishing:

  • Never provide confidential or financial information over the Internet in response to unsolicited e-mails.
  • Play it safe! If you’re not sure of the source of an e-mail or if it looks suspicious, don’t open it.
  • Be cautious! Even if you recognize a sender's e-mail address, do not rely on that alone because addresses may be faked.
  • Pay attention to the contents of the e-mail and be careful of any embedded links.
  • Never click on a link in an e-mail that you suspect may be fake.
  • Be sure! If you are unsure whether you are on a legitimate website, reopen your internet browser and type the company URL in the address bar yourself.
  • Before you enter confidential information online, check for the lock icon on your browser. Ensure the URL in the browser address bar starts with "https."
  • Be alert! Just because an e-mail or website appears to be from a legitimate company doesn't mean it is. Phishing schemes are designed to look real to trick users into divulging personal information for the purpose of financial fraud or identity theft.