How to Recognize and Report Suspicious Emails – Q&A

Q1. How would I recognize a phishing email? 

  • The plan of a phishing message is to take data from an individual. This is finished by communicating something specific that looks valid and misleading the beneficiary into revealing their own data, for example, usernames, passwords, and monetary data. 
  • The message comes from an unknown sender. Ordinarily these messages give the bogus impression that they are coming from a known source. In any case, after looking into it further, the sender’s email address isn’t related with the individual or element which they guarantee to be. 
  • The message will contain a spontaneous connection. Opening these connections can be unsafe to your PC and your data. On the off chance that you get a message with a connection that you didn’t ask for, don’t open the connection. 
  • Conventional or no welcome. Generally respectable and notable organizations will address you expertly and by your name. On the off chance that you get a message professing to be from your bank and it welcomes you with “Hello Customer” or even “Dear Customer” at that point you ought to be on caution. 
  • Dangers and Links – The message may incorporate a danger to impart a desire to move quickly to make a move promptly — for instance, your account will be shut in the event that you don’t click on the connection and confirm your data. 
  • An email that is inadequately composed can likewise be an indication of a phishing email. A few messages, notwithstanding, will be hard to distinguish as they look proficient and seem, by all accounts, to be from a notable business or element, including UCLA. Our UCLA IT Security division keeps a running rundown of phishing messages that have been accounted for in nature. It would be ideal if you click here to see the rundown. 

You must read about to Recognize and Report Suspicious Emails

Q2. How would I report a phishing email? 

At the point when you get a phishing email, you should report it directly to UCLA IT Security (they are the head IT unit at UCLA accountable for security nearby) by doing the accompanying: 

Give a full duplicate of the email by “saving” the email inside your email customer. 

– For Microsoft Outlook clients, this can be cultivated by hitting File > Save As subsequent to opening the email. 

Create another email with the beforehand saved phishing message added as a connection. 

Send the subsequent message and connection to with a title distinguishing the message as a phishing report. 

Finally, mark the message as garbage and erase the email. 

For more definite directions on the best way to save the email in Windows, Mac, or Gmail, kindly visit IT Security’s site here. 

Q3. Would I be able to be phished on my telephone over instant message? 

Truly, phishing tricks are not just separated to email despite the fact that they are the most widely recognized. In the event that you get a dubious solicitation from an unknown number, at that point disregard it or contact the individual whom they are mimicking. 


In the event that you have any inquiries concerning an email you got, need help with announcing, or other general help, kindly contact your DTA.

Related Posts