- Student Network Account
- Emergency Notifications
- Lab Information
- Outlook Email
- Remote Access
- TRU Go - Mobile App
- Virtual Course Software & Setup
- Microsoft 365 Student Migration Information
- Tips for Safe Computing
- Protect Your Identity
- Awareness Sessions
- Desktop Security Tools
- Standards & Policies
- Smart Phone Security
- About Us
- Multi Factor Authentication
- Digital Strategy
- Project Management Office
- IT Update Newsletter
Recognizing Phishing E-mails
This page has been moved to our new Knowledge Base. Information about Recognizing Phishing E-mails can be found here.
Phishing e-mails are becoming more sophisticated and can be tricky to spot. Being able to recognize phishing e-mails can help prevent you from becoming a victim.
Below is an example of a phishing e-mail with some common things to help identify them.
A closer look at phishing emails
If you believe you may have provided confidential information in response to a phishing e-mail, call us immediately.
Follow these tips to avoid being a victim to phishing:
- Never provide confidential or financial information over the Internet in response to unsolicited e-mails.
- Play it safe! If you’re not sure of the source of an e-mail or if it looks suspicious, don’t open it.
- Be cautious! Even if you recognize a sender's e-mail address, do not rely on that alone because addresses may be faked.
- Pay attention to the contents of the e-mail and be careful of any embedded links.
- Never click on a link in an e-mail that you suspect may be fake.
- Be sure! If you are unsure whether you are on a legitimate website, reopen your internet browser and type the company URL in the address bar yourself.
- Before you enter confidential information online, check for the lock icon on your browser. Ensure the URL in the browser address bar starts with "https."
- Be alert! Just because an e-mail or website appears to be from a legitimate company doesn't mean it is. Phishing schemes are designed to look real to trick users into divulging personal information for the purpose of financial fraud or identity theft.