Skip to main content

Academic Technology Launchpad: Spam

Quick Guide to computer and academic technology resources for students.

Phishing Scams

Junk email Settings and the Spam Filter

Your college email gives you the ability to manage lists of email addresses and domains that you want to block or allow emails from.

To get to the Junk email settings from your inbox: Click on Options, then Select Block or Allow.

block allow iconBlocked Senders List

Messages that are received from any email address or domain on your Blocked Senders List are sent directly to your Junk Email folder.

To add a sender to the Blocked Senders list

In the Blocked Senders list, type an email address or domain in the text box, and then press Enter.

To add a sender to the blocked senders list, in an email message you've received from that sender, right click on the sender's name, select Junk Mail, then choose Add sender to blocked senders list. This will automatically send  all incoming emails from this sender to your Junk email folder.

Safe Senders and Recipients List

This list will contain domains and email addresses that you choose are safe for you. Any email coming from the domain or email in this list will be directly delivered to your Inbox.

How long will my emails be kept in my deleted items and Junk email folder?

There will be an automatic delete from the deleted items and junk email folders after about 14 days.

Phishing, spam, malicious or suspicious emails

Our college email systems block over 300,000 spam message a day. However, we cannot eliminate all bogus email messages. Therefore, it is very important that you understand how to identify which email messages might be malicious or suspicious.

Guidelines for identifying and handling suspicious email

  • If an email looks suspicious, it probably is!
  • Fraudulent emails may often have spelling, grammar or punctuation errors. The subject line or the message text may not even make sense.
  • If you do not recognize the sender, delete the email.
  • Do not send sensitive, personal or confidential information via email. Protect your personal identity and information.
  • Do not share any of your usernames and passwords. 
  • Do not click any links in suspicious emails.
  • Do not reply to or forward a suspicious email.

What are phishing emails?

Phishing e-mail messages are designed to steal your identity. They ask for personal data, or direct you to web sites or phone numbers to call where they ask you to provide personal data. Unauthorized users may then use your information to send email from your email address, access your bank and other accounts, or purchase items on your credit card,

Phishing email messages

  • might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site such as Facebook.
  • might appear to be from someone you know. Spear phishing is a targeted form of phishing in which an email message might look like it comes from your employer, or from someone who might send an email message to everyone in the organization, such as the head of IT (information technology) at the college.
  • might include official-looking logos and other identifying information taken directly from legitimate Web sites, and they might include convincing details about your personal information that scammers found on your social networking pages.
  • might include links to spoofed web sites where you are asked to enter personal information.
  • might ask you to make a phone call. Phone phishing scams direct you to call a customer support phone number. A person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data. The phone phisher might claim that your account will be closed or other problems could occur if you don't respond.