Cyber Security at Wilkes University is considered very important. In order to provide you with as much information as possible to protect you, your identity and your computer, please utilize the resources below.

Security Resources

ITS has received multiple reports regarding circulation of emails with out-of-the-ordinary subject lines, such as “Piano Giveaways," "Tool Giveaways” or emails that ask for gift cards, encourage you to open an attachment or click on a link. These are phishing attempts. Phishing is an attempt to get personal and sensitive information from you via emails.

Wilkes University’s Information Technology Services will never request passwords or personal information via email.

A Wilkes email account phishing@wilkes.edu has been created to aid in identifying potential threats. Please continue to forward any questionable emails to phishing@wilkes.edu and refrain from responding to any message you are not certain is genuine. The campus community will be advised of new threats as they are identified. Please contact the Help Desk at x4357 or 1-866-1462 with any questions or concerns.

For more information, view the Microsoft Phishing FAQ external website

What is a Phishing Email?

A phishing email is a message that attempts to steal personal information in regards to your identity.

How to Recognize a Phishing Email

A phishing email appears in a variety of forms. Here are a few ways to help you recognize a phishing email. It's important to remember that Wilkes University’s Information Technology Services will never request passwords or personal information via email.

  • Phishing emails may appear to come from places you do business with (banks, social media websites). They may also appear to be from someone you know or an employer. There are two forms of phishing in particular.
    • Spear Phishing is a targeted form of phishing where the email appears to come from an employer or colleague (such as an IT email).
    • Phone Phishing is a form of phishing in which the email directs you to make a phone call to a customer service line. Generally, these phone numbers lead to a person or automated response which requests personal information.
  • Phishing emails may also use official logos or banners taken directly from the actual website. Often links in the email will refer to a spoofed (or fake) website.

Phishing Links

Phishing links are links that direct you to a spoofed website. Here are some things to look out for:

  • Often phishing links will be very similar to an official sites link. They could be off by one or two letters, but look familiar enough that someone will click on them. For example:
    • Correct Link: https://www.wilkes.edu
    • Phishing Link: https//www.wlkes.edu
  • Phishing links also contain hidden forms or links. They often mask the link by having it appear one way, but link to completely different link.
  • If you are uncomfortable or concerned about an email, the best response is to delete it. Never provide personal information via email. Do not click a link in an email if you are unsure of the contents, even if it's from a friend or co-worker.

Most importantly, please remember that Wilkes University’s Information Technology Services will never request passwords or personal information via email. For more information, please visit Microsoft's Phishing FAQ external website or view the Resources information below.