Information Technology A to Z Index

Student Support

Phishing and Suspicious Email

Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware.  Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors. 

Learn to Spot Phishes

Quick Tip: Check Links Before Clicking

Check the full URL to see if it goes where you expect.

Checking Email Rules - myMail

Issue: I need to check my email rules to see if someone had hacked me or I need to edit/delete those I have set.

Product: EKU Student myMail system

Resolution:

Rules allow you to move, flag, and respond to email messages automatically. You can also use rules to play sounds, move messages to folders, or display new item alerts.

Pages