With 91% of security breaches being caused by phishing emails, it is important to be diligent when using email. The university blocks around 85% of all incoming email (approximately 2.5 million per day) which includes spam, known phishing attempts, Trojans, and malware. New phishing attempts are created daily and sometimes they get through before the university can block them so it’s up to you to react properly when receiving a suspicious email. If you are unsure about the legitimacy of an email please contact Galen Harrison or Jeff Spears. If it is malicious it will be forwarded to infosec@wustl.edu to be added to the email filter.

In addition, there are many unsecured plug-ins for web browsers and third-party software (especially free games) that can make your computer vulnerable to attack. Please ask Jeff and Galen to investigate any new software and plug-ins you are considering installing on your computer.

Here is some information provided by the university’s Office of Information Security and the most current information can be found there.

Outlook Phish Alert Button (PAB)

Link Safety

Remote Work

Technology Safety While Traveling

Security Strategies for iOS

Minimize Your Risk

Avoid the tricks by being aware of the tactics:

  • Only open an email attachment or click on a link if you’re expecting it and know what it contains. Do not open email attachments or click on the links from unknown or untrusted sources.
  • If something looks suspicious in an email from a trusted source, call and verify the email is legitimate.
  • (Follow these instructions at home. This is not for the University Marketing & Communications computers.) Use up-to-date antivirus protection and apply recommended patches/updates to your device.
  • (Note: Software on University Marketing Communications computers must go through a vetting process.) Only install third-party applications and software that you really need. Make sure it is from the vendor or the Android, Apple or Windows Store. Since the app stores allow third-parties to post and sell apps, make sure the app is from a trustworthy source.
  • Use discretion when posting personal information on social media. This information is a treasure-trove to scammers who will use it to feign trustworthiness.