Email Security

Email is a great tool for communicating with others. Unfortunately, it is also an ideal tool for social engineering and phishing attempts. Phishing schemes are get more sophisticated and harder to detect. Here are some quick tips to keep in mind.

  1. Do NOT click on links in emails. Type the address directly into the web browser.
  2. Learn to spot non-legitimate web sites:
    Look at the address between the // and the first / – it should end with the company you expect
    Fake: http://www.1025.rud/js/…
  3. When TCU upgrades its computer or email systems, we will NEVER send a link inside an email which will go to a website requesting that you login or enter your username and password.
  4. TCU Information Technology, including the IT Support Help Desk and IT Security, will NEVER ask you for your password, via email, the phone or in person. No reputable company will ask you for your password.
  5. If an email looks fishy, it probably is. Just delete it.

Click the links below for more information:

How to Forward Email as an Attachment – you can forward a phishing email to

How to Protect Yourself on Email – a handout with techniques to deal with phishing, spam, spoofing, attachments and data protection

Email Security 2010 – a PowerPoint presentation focusing on email best practices

Email Spoofing – counterfeit emails using stolen addresses – it can happen to you!