Skip to content
St George's and City have merged. Find out more.

Responding to suspected phishing emails

In an era where cybersecurity threats like phishing emails perpetually loom over the digital landscape, it’s paramount that SGUL staff are well-equipped with the knowledge and procedures to deal with these invisible threats. Phishing emails can appear legitimate but are designed to harvest your personal and financial information, sometimes causing colossal damage to you and organisations alike.

Any queries on the below or if you are seeking advice on Cyber security matters then contact the Cyber Security Manager

Actions to take regarding phishing emails

View all Close all
Recognising phishing attempts.

 Identifying a phishing email might sometimes be challenging due to the deceptive techniques employed by cybercriminals. Common indicators include:

  • unsolicited communications asking for personal or financial information
  • urgency: Messages claiming your immediate action is required
  • spelling and grammatical errors
  • misleading URLs or email addresses
  • unexpected attachments or links.
Immediate action - Reporting suspicious emails

When you suspect you have received a phishing email, the immediate course of action is to avoid clicking on any links, downloading attachments, or providing any personal information.

Here at St George's, our protocol dictates that all suspicious emails be forwarded to the Helpdesk at itav@sgul.ac.uk.

Steps to Forward a Suspicious Email to ITAV Team:
  1. Do not engage: Refrain from replying to the email or interacting with any links or attachments.
  2. Forward the email: Directly forward the entire suspicious email to itav@sgul.ac.uk
  3. Delete the email: Once forwarded, ensure that the suspicious email is deleted from your inbox to prevent accidental interactions.
  4. Communicate: If the email contained urgent or sensitive information, communicate with the concerned department or individual via a known and trusted method to verify the legitimacy of the message.
Post-reporting steps
  1. Alert your colleagues: If the phishing email is posing as an internal communication, inform your colleagues to be on the lookout for similar emails.
  2.  Password security: If you suspect that your credentials might have been compromised, change your password(s) immediately.
  3. Continuous vigilance: Always be wary of unsolicited communications and keep abreast with the latest phishing tactics used by cybercriminals.
  4. Education: Attend any cybersecurity awareness sessions offered by the university to enhance your knowledge and preparedness against such threats.

 

Find a profileSearch by A-Z