{"id":69442,"date":"2020-11-12T00:00:00","date_gmt":"2020-11-12T06:00:00","guid":{"rendered":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/"},"modified":"2020-11-12T00:00:00","modified_gmt":"2020-11-12T06:00:00","slug":"what-to-do-if-an-email-looks-phishy","status":"publish","type":"post","link":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/","title":{"rendered":"What to do if an email looks phishy"},"content":{"rendered":"<div class=\"panel body-content\"><div class=\"panel__container\"><p><P><B>What is spoofing and phishing?<\/b><br \/>\n<P>Both spoofing and phishing are based on an email sender (hacker) being able to deceive the recipient (you) to gain access to sensitive information or data. Spoofing&#8217;s purpose is to trick the recipient into downloading or executing a malicious file, whereas phishing&#8217;s purpose is to trick the recipient to willingly provide sensitive information or data.<br \/>\n<P><b>I am suspicious of an email. What do I do?<\/b><br \/>\n<P>Emails that are suspected to be spoofing or phishing should be reported using the Report Phish button.<br \/>\n<P>Found on the Home Toolbar in Outlook application.<br \/>\n<TABLE border=\"0\" width=\"650\" cellspacing=\"10\" align=\"right\"><br \/>\n<TR><br \/>\n<TD><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/IT1111220.jpg\" border=\"0\" align=\"right\" alt=\"picture disc.\"><br \/>\n<\/TD><br \/>\n<\/TR><br \/>\n<TR><br \/>\n<TD><br \/>\n<span style=\"font-size:0.85em; line-height:150%;\"><\/span><br \/>\n<\/TD><br \/>\n<\/TR><br \/>\n<\/TABLE><\/p>\n<p><P>Found on the Banner Strip in Outlook online.<br \/>\n <TABLE border=\"0\" width=\"650\" cellspacing=\"10\" align=\"right\"><br \/>\n<TR><br \/>\n<TD><br \/>\n<img decoding=\"async\" src=\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/IT2111220.jpg\" border=\"0\" align=\"right\" alt=\"picture disc.\"><br \/>\n<\/TD><br \/>\n<\/TR><br \/>\n<TR><br \/>\n<TD><br \/>\n<span style=\"font-size:0.85em; line-height:150%;\"><\/span><br \/>\n<\/TD><br \/>\n<\/TR><br \/>\n<\/TABLE><br \/>\n<P><B>Other tips to protect yourself from email attacks<\/b><\/p>\n<ul>\n<li>Do not respond to an email (or click on a link) that asks you to validate your information and then asks for IDs, passwords and other sensitive information. UNMC and Nebraska Medicine Information Technology Services will not ask for this information in an email.\n<li>Do not click on unknown links or attachments, as these can be disguised to make them appear legitimate.\n<li>Do not enter information in a pop-up.\n<li>Do not respond to or take actions on emails regarding urgent requests or wire transfers.\n<li>Emails with poor spelling and grammar are red flags that the email is a scam. Delete it immediately.<br \/>\n<LI>Do not send personal information in an email or through an unsecured website. Only enter sensitive data if you trust the website AND if it has a lock icon in the URL.<br \/>\n<LI>Always check to see who the email is coming from. It is common for an attacker to pretend they are someone you may know such as a colleague, manager, leader, etc. Do not respond to these emails! If you believe the email is legitimate, contact the sender by a known phone number to verify the individual and request.<\/p>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Tips to avoid common hacker strategies.<\/p>\n","protected":false},"author":27,"featured_media":40906,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-69442","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","topic-inside-unmc","department-its","department-unmc-today-todays-headlines"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What to do if an email looks phishy<\/title>\n<meta name=\"description\" content=\"Tips to avoid common hacker strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do if an email looks phishy\" \/>\n<meta property=\"og:description\" content=\"Tips to avoid common hacker strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/\" \/>\n<meta property=\"og:site_name\" content=\"Newsroom\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/unmcedu\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-12T06:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Keenan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@unmc\" \/>\n<meta name=\"twitter:site\" content=\"@unmc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Keenan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/\"},\"author\":{\"name\":\"John Keenan\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/person\\\/59c9598a54f1a531c30cccc1d010ac17\"},\"headline\":\"What to do if an email looks phishy\",\"datePublished\":\"2020-11-12T06:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/\"},\"wordCount\":313,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/security.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/\",\"name\":\"What to do if an email looks phishy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/security.jpg\",\"datePublished\":\"2020-11-12T06:00:00+00:00\",\"description\":\"Tips to avoid common hacker strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2012\\\/08\\\/security.jpg\",\"width\":500,\"height\":288},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/2020\\\/11\\\/12\\\/what-to-do-if-an-email-looks-phishy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do if an email looks phishy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#website\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\",\"name\":\"Newsroom\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#organization\",\"name\":\"University of Nebraska Medical Center\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/overview-1.png\",\"contentUrl\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/overview-1.png\",\"width\":500,\"height\":153,\"caption\":\"University of Nebraska Medical Center\"},\"image\":{\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/unmcedu\",\"https:\\\/\\\/x.com\\\/unmc\",\"https:\\\/\\\/instagram.com\\\/iamunmc\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/UNMCEDU\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/#\\\/schema\\\/person\\\/59c9598a54f1a531c30cccc1d010ac17\",\"name\":\"John Keenan\",\"url\":\"https:\\\/\\\/www.unmc.edu\\\/newsroom\\\/author\\\/02e74f10e0327ad868d138f2b4fdd6f0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What to do if an email looks phishy","description":"Tips to avoid common hacker strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/","og_locale":"en_US","og_type":"article","og_title":"What to do if an email looks phishy","og_description":"Tips to avoid common hacker strategies.","og_url":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/","og_site_name":"Newsroom","article_publisher":"https:\/\/www.facebook.com\/unmcedu","article_published_time":"2020-11-12T06:00:00+00:00","og_image":[{"width":500,"height":288,"url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg","type":"image\/jpeg"}],"author":"John Keenan","twitter_card":"summary_large_image","twitter_creator":"@unmc","twitter_site":"@unmc","twitter_misc":{"Written by":"John Keenan","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#article","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/"},"author":{"name":"John Keenan","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/59c9598a54f1a531c30cccc1d010ac17"},"headline":"What to do if an email looks phishy","datePublished":"2020-11-12T06:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/"},"wordCount":313,"commentCount":0,"publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/","url":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/","name":"What to do if an email looks phishy","isPartOf":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#primaryimage"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#primaryimage"},"thumbnailUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg","datePublished":"2020-11-12T06:00:00+00:00","description":"Tips to avoid common hacker strategies.","breadcrumb":{"@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#primaryimage","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2012\/08\/security.jpg","width":500,"height":288},{"@type":"BreadcrumbList","@id":"https:\/\/www.unmc.edu\/newsroom\/2020\/11\/12\/what-to-do-if-an-email-looks-phishy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.unmc.edu\/newsroom\/"},{"@type":"ListItem","position":2,"name":"What to do if an email looks phishy"}]},{"@type":"WebSite","@id":"https:\/\/www.unmc.edu\/newsroom\/#website","url":"https:\/\/www.unmc.edu\/newsroom\/","name":"Newsroom","description":"","publisher":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.unmc.edu\/newsroom\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.unmc.edu\/newsroom\/#organization","name":"University of Nebraska Medical Center","url":"https:\/\/www.unmc.edu\/newsroom\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/","url":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","contentUrl":"https:\/\/www.unmc.edu\/newsroom\/wp-content\/uploads\/2022\/08\/overview-1.png","width":500,"height":153,"caption":"University of Nebraska Medical Center"},"image":{"@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/unmcedu","https:\/\/x.com\/unmc","https:\/\/instagram.com\/iamunmc","https:\/\/www.youtube.com\/user\/UNMCEDU"]},{"@type":"Person","@id":"https:\/\/www.unmc.edu\/newsroom\/#\/schema\/person\/59c9598a54f1a531c30cccc1d010ac17","name":"John Keenan","url":"https:\/\/www.unmc.edu\/newsroom\/author\/02e74f10e0327ad868d138f2b4fdd6f0\/"}]}},"_links":{"self":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/69442","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/comments?post=69442"}],"version-history":[{"count":0,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/posts\/69442\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media\/40906"}],"wp:attachment":[{"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/media?parent=69442"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/categories?post=69442"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.unmc.edu\/newsroom\/wp-json\/wp\/v2\/tags?post=69442"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}