it.troy.edu logo
Search TROY IT


Search Helpdesk
Quick Links
Information for:
Jump to Main Content
Safe-Connect Logout
Safety Alert System Notice
  • About
    Offices & Hours Announcements Awards & Recognition IT Update (Newsletter) Insights IT Summit IT Employee Area
  • Services
    Classroom Technology Computer Labs Conference Rooms Cyber Security ERP Support (Colleague/Datatel)
    Document Imaging E-mail (Microsoft 365) Flex Classes Support Internet/Networking Software Support
    Technology Quotes Telecommunications Training Video Conferencing/Webinar Website Design & Management
  • Students
    Student IT Homepage 1098-T Consent/Information Canvas Canvas Student Resources Classroom Technology Computer Labs
    E-mail E-mail Password Reset Emergency Alert System Information
    (SOS)
    Frequently Asked Questions Internet Access
    LiveText Student Security Student Software Technology Policies TROY IT Orientation
  • Employees
    Employees IT Homepage New Employee Enrollment
    Process (HR)
    New Employee IT Checklist Find Your Employee
    (Colleague) ID Number
    International Travel Requirements
    Cell Phone Request/Deduction Form Request E-mail Account Request Colleague Account Request Document Imaging Account
    Request VPN Account Reset Your E-mail Password Remote Productivity Tools
  • Policies
    Technology Policies Homepage Generative AI Copyright Information Data Governance Data Reporting
    E-mail Policy Family Education Rights &
    Privacy Act (FERPA)
    Information Technology Usage Policy International Travel Requirements
    Security Policy Technology Standardization Guidelines Website Disclaimer World Wide Web Policy
  • IT logo
  • Security
    Security Homepage Account Access and Recovery Mandatory Security Training Emergency Information (SOS)
    Request Guest Network Access Phishing E-mail Messages Admin Systems Security Access
    Authorization Process
    Security Policy Screen Locking Standard Quarterly IT Security Award Winners
  • Projects
    Project Archives
  • Help
    Faculty/Staff Directory Search IT Offices/Hours Helpdesk Knowledgebase Helpdesk LogMeIn Rescue University Police Help Directory Cleaning Computers and Electronics for All Users
  • troy.edu
  • Open Search
Cyber Security
Security Menu
  • Home
  • Take Action
    • Report a Vulnerability
    • Report a Security Incident
    • Report a Stolen Item
    • Report a Phishing Message
    • Change Password
    • Report Abuse of Electronic Resources
  • Education & Guides
    • [External] E-mail Tagging
    • Recent phishing attempts received by University students and employees
    • Best Practices for Securing Your Desktop
    • Learn about copyright, DMCA and University Policies
    • Best Practices for Reducing Spam
    • Use Password Managers
    • OUCH! Security Awareness Newsletter
  • Password Management
  • Phishing
  • Physical Security
  • Theft of Computer Equipment
  • Policies & Procedures
    • Account Access and Recovery
    • Alabama Breach Notification Act of 2018
    • Admin Systems Security Access Authorization Process
    • Copyright Information
    • E-mail Policy
    • Information Technology Usage Policy
    • International Travel Requirements
    • World Wide Web Policy
    • Technology Policies
    • Technology Standardization Guidelines
  • Additional Resources
    • Contact Information Technology
    • Contact University Police
    • Information Technology Website
    • Information Technology Policy
    • University Police
    • Emergency/SOS
  • Quarterly IT Security Award

Phishing

Recognizing and Avoiding Phishing Scams

Phishing continues to be one of the most common methods used by attackers to deceive individuals into giving up personal or sensitive information. The best defense is awareness.

What Is Phishing?

Phishing refers to fraudulent attempts, typically via email or text, to trick you into revealing personal information such as login credentials, financial data, or installing malicious software. The goal may be to access your accounts, steal your identity, commit financial fraud, or infect your computer with ransomware.

Sometimes the sender impersonates someone you know or trust, like a coworker, supervisor, or friend. This targeted form of phishing is called spear phishing. Modern phishing messages are more sophisticated than ever. Knowing the warning signs can help you avoid falling victim.

Signs of a Phishing Attempt

  • The sender’s email address doesn’t match their claimed identity (e.g., it looks like it’s from Troy University but isn’t from “@troy.edu”).
  • Links in the message point to unfamiliar or suspicious websites.
  • Requests for your username, password, or login credentials. Troy University will never ask for your login info by email, phone, or text.
  • Unsolicited requests for personal information like your Social Security number, home address, or date of birth.
  • Email attachments that seem unexpected or out of context.
  • Unusual or awkward language in the message.
  • Promises of payment or job offers that require you to submit information first.

Watch a YouTube video on phishing

Common Phishing Tactics

  • Messages claiming urgent action is needed to verify an account or reset a password.
  • Fake employment offers asking for your personal details.
  • Health warnings or fake illness alerts spreading within a department or workplace.
  • Requests for gift cards or cryptocurrency.
  • Fake shipping updates or bogus invoices.
  • Scams promoting student loan forgiveness or debt relief.

See examples of phishing scams

What You Should Do

  • Pause before you act. Don’t respond or click anything without thinking it through. If you're unsure, check the message again on a larger screen.
  • Don’t open attachments from people you don’t know or messages you weren’t expecting.
  • Never respond to emails or pop-ups asking for personal data.
  • Hover over links (or tap and hold on mobile) to see where they really go.
  • Verify through official channels. If something seems off, contact the person or organization using contact info you already trust—not the info in the suspicious message.
  • Don’t send money (cash, gift cards, or cryptocurrency) without confirming the request directly with the individual.
  • Avoid wire transfers. Legitimate organizations or government agencies will not ask for this.
  • Protect your social media. Limit what others can see and who can post to your profile. Attackers often mine this information to make spear phishing more convincing.

Knowledge Base Article

How to Report Suspicious Messages

  • Use the “Report Phishing” option in your Troy University email service. Reporting suspicious messages helps improve email filtering and protects others.
  • If you believe you’ve responded to a phishing message, stop communicating immediately, change your passwords, and enable two-factor authentication where possible.
  • If you think your Troy University account has been compromised, contact the IT Security Office immediately: https://it.troy.edu/security/index.html
Troy University Horizontal Logo
  • Troy, Alabama 36082
  • 1-800-414-5756
  • Questions?
  • Submit Feedback
  • Student Complaints
  • Student Disability Services
  • Accessibility Statement
  • Privacy Statement
  • Read Our Disclaimer
  • Accreditation Statement
  • Sites and Services Index

© 2025 Troy University

Scroll to Top of Current Page