- Banner FAQ
- Faculty & Staff E-mail
- Forms and Procedures
- Help Desk
- IT Policies
- IT Projects(PMO)
- IT Security
- IT 2013 Strategic Goals
- IT 2012 Strategic Goals
- IT 2010 Strategic Goals
- IT 2009 Strategic Goals
- Other FAQ
- Scheduled Outages
- Software Training Courses
- Student E-mail
- Student E-mail FAQ
- Submit a Request
- Virtual Labs
University Computer Center
2801 W. Bancroft
Toledo, OH 43606-3390
UTMC | Dowling Hall
3000 Arlington Avenue
Toledo, OH 43614
Sensitive Information Links
Phishing emails are deliberate attempts for criminals to gather personal information. The goal is to get the recipients to provide information without thinking such as usernames, passwords, and financial credentials.
THE UNIVERSITY OF TOLEDO WILL NEVER REQUEST YOUR USERNAME AND PASSWORD BY EMAIL!
Attackers use information gathered from phishing emails to send SPAM email or access private accounts to commit identity theft.
When you receive an email requesting personal information and it seems suspicious, review the following tips:
- Email claiming to be from the University of Toledo: The University of Toledo does not request personal information via email. If you
suspect a problem with your email or UTAD account, call the Help Desk at X-2400 on
all campuses for assistance.
- Non-specific greetings: These may be generic such as "University Student." Or “Email User.” Sometimes there is no greeting at all.
- Request for Personal Information: Legitimate email should not request personal information such as account user names,
birthday, Social Security number or date of birth.
- Urgency: Look for language that wants an immediate response without thinking.
- Poor grammar, punctuation errors and misspellings: These are classic signs of a fake and don't be fooled by official looking graphics.
- If it sounds too good to be true, it probably is: Avoid claims of easy money or claims of winning a contest you have not entered. It
pays to be skeptical.
- Ignore false claims of security and privacy. These official sounding statements are designed to let your guard down. It is wise to use caution.
See the following links for tips to help identify a phishing email:
How to spot a phishing email – CSO Security and Risk Online
How can I recognize a phishing email – Yahoo Security