skip to main content
UTRGV The University of Texas Rio Grande Valley
Main Menu
Donate Now Directory myUTRGV

You are here:

Home Resources Training Phishing

Information Security Office

  • Home
  • Report an Incident
  • News & Alerts
    • Archived News and Alerts
    • Archived Emails
    • Newsletter
  • Resources
    • Policies, Standards and Compliance
    • Software Assessment
    • Forms
    • How-To
      • Phishing Alert Button
    • Training
      • NEO
      • Data Owner
      • ISA
      • Security Awareness
      • Social Media
      • Phishing
      • Other
    • Events
      • NCSAM
      • NSAM
      • Data Privacy Day
    • Cyber Security Videos
    • Frequently Asked Questions
    • Training Feedback
  • About Us
    • Mission and Services
    • Staff Directory
    • Our Location

Resources - Related Links

  • Policies, Standards and Compliance
  • Software Assessment
  • Forms
  • How-To
    • Lock IT down
    • Remove Malware
    • Phishing Alert Button
    • Lock IT down
  • Training
    • NEO
    • Data Owner
    • ISA
    • Security Awareness
    • Social Media
    • Phishing
    • Other
  • Events
    • NCSAM
      • What is NCSAM
      • Cyber Security Expo
      • Stop. Think. Connect
    • NSAM
    • Data Privacy Day
  • Cyber Security Videos
  • Frequently Asked Questions
  • Training Feedback

Contact Us

Information Security Office
Email: is@utrgv.edu
Phone: (956) 665-7823
Fax: 956-665-3154
Facebook Twitter

Quick Links

UTRGV Acceptable Use and Security Policy How to report suspicious/phishing emails Data Storage Guide Social Media Access Controls

Phishing

Stop, think, connect. Do not open attachments or click links from untrusted resources. Never Send Personal information in an email. Keep your firewall and antivirus updated.
What is Phishing and how does it work?

Phishing is a form of fraud in which the cybercriminal tries to learn information by tricking you as a trustworthy entity or person via email, websites, and phone calls.

According to Microsoft, cybercriminals aim to convince you to install malicious software by downloading attachments, they also look to persuade you into handing over your personal information by replying or by clicking a malicious link in a seemingly legitimate email.

Watch out for the following:

  • Unsolicited emails, text, or social media posts or fake websites that may prompt you to click on a link or to share valuable personal and financial information.

Targeted Phishing scams

Tax Fraud:

  • Fake IRS agents: The IRS will never email or call you demanding immediate payment without having first mailed a bill. Nor will they ask for a credit or debit card number via email or phone.
  • Soliciting W-2 information from payroll.
  • “Federal Student Tax” scams targeting students and parents and demanding payments.
  • Automated calls requesting tax payments.

How to identify phishing scams?

Here is an example of what a phishing scam in an email message might look like.

phishing example

Things to look for:

  • Beware of links in suspicious emails! NEVER click them.

  • NEVER download or open any attachments.
  • Hover over the link: Simply place your mouse over the link to see the web address. (Links might also lead you to .exe files. These kinds of file are known to spread malicious software.)

  • Threats might be included. For example:

    • "Your account would be closed if you don't respond with your username and password."
  • Scam artists use logos or photos in emails that appear to be connected to legitimate websites.

Beware of phishing phone calls

Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license.

Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

Where can you report phishing scams?

If you receive an email involving your UTRGV email address that you suspect may be a phishing message:

  • Please follow these instructions from the IT website: https://support.utrgv.edu/TDClient/1849/Portal/Requests/ServiceDet?ID=34965
If you received a potential phishing email concerning your personal email address:
  • Use the U.S. Federal Trade Commission (FTC) Compliant Assistant form. https://www.ftccomplaintassistant.gov
Learn more about how to spot scams and where to report them here:  https://www.irs.gov/uac/report-phishing

Extra resources

How to recognize phishing email messages, links or phone calls: https://www.microsoft.com/en-us/safety/online-privacy/phishing-symptoms.aspx

IRS Tax scams / consumer alerts:https://www.irs.gov/uac/tax-scams-consumer-alerts

Phish bowl

A collection of phishing, scam, and other suspicious emails

Below are the latest phish emails that we are seeing impacting our university.

  • FAKE Google Play Gift Cards email - English
  • FAKE IT HELP DESK email - English
  • FAKE VERY URGENT email - English
  • FAKE Dr. Guy Bailey email - English
  • FAKE Dr. Havidan email - English
  • Dr. Havidan correo electrónico FALSO - Spanish

If you get a suspicious email but don't see it listed here, Do NOT assume it's safe. There are several types of phishing emails. When in doubt, consult with your IT support staff or the IT Service Desk.

Jump to Top

UTRGV

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube
  • CARES, CRRSAA and ARP Reporting
  • Site Policies
  • Contact UTRGV
  • Required Links
  • Fraud Reporting
  • Senate Bill 18 Reporting
  • UTRGV Careers
  • Clery Act Reports
  • Web Accessibility
  • Mental Health Resources
  • Sexual Misconduct Policy
  • Reporting Sexual Misconduct