Tulane processes just under five million email messages every day accommodating approximately 70,000 personal and resource accounts. We dedicate significant resources to filtering spam and phishing messages to minimize the risk of malicious email.
Tulane processes just under five million email messages every day accommodating approximately 70,000 personal and resource accounts. Technology Services dedicates significant resources to filter these messages for spam and phishing because we understand that phishing and spam are both annoying and potentially dangerous. We have to balance the task of blocking malicious email while not blocking legitimate traffic. Implementing much more restrictive filtering rules might result in blocking emails that Tulane customers need.
Tips To Not Get Phished
- Never send your password in an email.
- If it’s suspicious report it to firstname.lastname@example.org.
- Hover over links with your mouse cursor to find suspicious links.
- Watch for warning signs like EMERGENCY or URGENT that are meant to scare you into responding.
- Tulane will never ask you for your password!
Visit this link to learn more about email security
Technology Services works closely with Microsoft to filter incoming messages. Read the Details Here:
When phishing and spam do get through, we notify Microsoft with the relevant information. Users can assist by sending any offending message along with header information to email@example.com. See this Knowledge Base article for instructions on how to locate the header information in an email message:
Compromised user accounts - Protect your account credentials
In many cases the phishing messages that are getting through to users are the result of a compromised Tulane account – a student, faculty or staff member unwittingly gives up his Tulane password to a scammer, who then uses that legitimate Tulane account to spam or phish other Tulane users. The scammer will change the user’s password, lock him/her out of the account, and send phishing messages to thousands of Tulane recipients in seconds.
Access to other systems
Once a scammer has your credentials, they also have access to other important systems such as Canvas, Gibson, Box and every other system that accepts a Tulane username and password.
More About Phishing
See the following Knowledge Base articles related to phishing and secure computing: