Recognizing suspicious email—including phishing, spam, and email spoofing—and how to report them.

Articles (4)

Pinned Article Reporting a suspicious email

What to do if you receive a suspicious email.

Email spoofing

This article discusses the common characteristics of an email spoofing campaign.

Phishing and spam emails

Links to help you identify and avoid phishing attempts and spam email.

Securing a compromised account

If your Michigan Tech account has been compromised, there are some steps you can follow to regain control.