Phishing Overview

Security Information:


  • What is phishing and what do I need to know about phishing attacks?


While spam email might be annoying, phishing emails, depending on your awareness and response, can put your personal information and data at risk.  Spam email is unsolicited email messages sent to a large number of email addresses. Phishing is the fraudulent practice of sending emails that look like they are from reputable companies in order to get you to reveal personal information like as passwords, credit card numbers, etc.

  • Characteristics of phishing emails
    • Emails coming from a non-metrostate address such as, 
      • Check your "reply-to" before sending an email to validate it is going to a trusted contact. 
      • Never open attachments from un-trusted contacts. Even if you trust a contact, be suspicious of attachments as the trusted contact may not know if the attachment they sent is suspicious. 
    • Email begins with a short/suspicious subject:
      • Examples: 
        • Subject: Follow up 
        • Subject: Are you available 
        • Subject: Hello 
    • Correspondence escalates to an email message asking more about: 
  • Gift card purchase 
  • Wire transfers and bank account/credit card information 
  • Reports containing sensitive data 

Metropolitan State University will not ever ask you for sensitive data via email (passwords, credit card numbers, etc.).

  • What to do if you receive a suspected phishing email:
    • If you think an email is suspicious, you can do something about it right away!  Please see Report Phishing Email and Classify Junk / Non-Junk Email for details on how to report phishing and benefit not only yourself, but others who may have received a similar email.
    • Do NOT reply to email or click on any links contained within the email.
    • Remain vigilant and be suspicious of any email that you receive regarding the need for you to perform a task you are not familiar with.
    • Contact the IT Service Desk at 651-793-1240 to confirm your suspicion.  We are always happy to help.



Print Article


Article ID: 65006
Tue 10/9/18 4:36 PM
Tue 7/25/23 11:12 AM

Related Articles (2)

View how to report phishing email from Outlook, as well as report and classify phishing, junk and not junk email
Learn safe computing practices to help protect devices and personal information.

Related Services / Offerings (1)

Report technology related information security incidents for our Information Security team to review.