Guidance for Identifying Phishing Emails:

What is a Phishing Email?


A phishing email is a fraudulent attempt to obtain sensitive information (such as usernames, passwords, financial details) or to install malware by disguising as a trustworthy source.

Recognizing Phishing Emails:

  • Check Sender's Email Address: Verify the sender's email address. Sometimes, it may appear similar but not identical to the legitimate address.

  • Spelling and Grammar: Phishing emails often contain spelling or grammatical errors.

  • Urgency or Threats: Emails creating a sense of urgency, threats of consequences, or enticing offers might be suspicious.

  • Unsolicited Attachments or Links: Avoid clicking on links or downloading attachments from unknown or unexpected sources.

  • Request for Personal Information: Legitimate organizations will never ask for sensitive information via email.

Steps if You Suspect a Phishing Attempt:

1. Do Not Interact:

  • Do Not Click on Links or Download Attachments: Avoid interacting with any suspicious links or attachments in the email.

  • Do Not Provide Personal Information: Never share sensitive information like passwords, social security numbers, or banking details.

2. Report the Suspicious Email:

3. Delete the Email:

  • Move the suspicious email to the Spam or Trash folder and delete it permanently.

If You've Interacted with the Phishing Email or its Links:

1. Change Your Passwords Immediately:

  • Change your Coker email password and any other accounts that might have been compromised.

2. Run Anti-Malware Software:

  • Run a full system scan using recommended anti-malware software provided through Coker University’s IT support team  on any campus issued devices.

  • On personal devices, please use any anti-malware software you have purchased or has been provided through the device itself.

3. Notify IT Support:

  • Immediately inform the Coker University IT support team about the incident for further guidance and assistance.

  • Make sure to provide the type of information you sent in response to the email as well as any actions taken after clicking on links in the email. 

4. Monitor Your Accounts:

  • Keep a close eye on your accounts for any suspicious activity or unauthorized access.

Additional Tips to Stay Safe:

  • Enable two-factor authentication (if available) for added security.

  • Regularly update your passwords and use strong, unique passwords for different accounts.

  • Educate yourself and others about phishing awareness and best practices by reviewing the section on Phishing in your Vector Safe Colleges training.

  • Vector safe College Training Login

Students : https://cokerstudents-sc.safecolleges.com/login

            Staff : https://coker-sc.safecolleges.com/



Contact Information for Reporting: