Search5 Results

Learn what actions you should take to protect your accounts and report the incident.
Although your first instinct may be to ignore or delete suspicious emails, we recommend that you report them to our security team. IT will examine the email and advise you of any further steps you may need to take.
A compromised account is one accessed by a person not authorized to use the account.
Phishing attacks and other email scams take advantage of personal and professional relationships, organizational hierarchies, and human curiosities — information that is now readily available through social media and professional networking websites.
Spear phishing is a form of phishing that targets people. Request gift cards is a common tactic among spear phishers.