Skip to main content

Fitchburg State uses technology to gather information and better understand visitors’ experiences. By continuing to use this website, you consent to this usage in accordance with our Privacy Policy.

What is Phishing?

“Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking, and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. “-

Common Phishing Attacks

In the following example, the email sender is unrecognized:

The email is trying to create a sense of urgency to inspire action. Wanting you to do something now. Additionally, the email has improper grammar and extraneous requirements for passwords.

Screenshot showing an example of a phishing email.

The following is an example of the unsecured fake website vs the secured site:

Image showing a fake website that has no logo and spelled username as two words

First Steps

Always check the sender address of an email. Make sure the sender is someone you recognize. 

You should never click/enable macros or content from unknown sources.

Send any suspicious emails to

How to Protect Yourself

Check the sender address on the message. Make sure the name and email are legit.

  • On Windows Outlook: Hover over the sender name to see additional details.
  • On Mac Outlook: Hover over the name then click on the contact card.
    Image showing the Mac Outlook Contact Info

Next, verify the sender information on the contact card.
Image showing the Outlook Contact Card

Check Links in the Emails and Think Before You Click!

Hover over the links in the emails to see where they go. Do they lead to where they are supposed to? A phishing email may claim to be a legit site but will lead elsewhere. When in doubt go directly to the website you were looking for.

Be Wary of Attachments in Emails

Attackers want you to open up the attachments and install malware. If the attachment wants you to enable macros or content it is likely trying to install something on your computer. Make sure any attachments come from known senders.

Test Your Awareness

Try out Google's test to see how well you know phishing at


Chat with our team

Have questions?
Chat with an expert!

New Chat