  {"id":12321,"date":"2025-05-07T13:53:43","date_gmt":"2025-05-07T18:53:43","guid":{"rendered":"https:\/\/uwm.edu\/technology\/?p=12321"},"modified":"2025-05-07T13:53:43","modified_gmt":"2025-05-07T18:53:43","slug":"account-deactivation-scam","status":"publish","type":"post","link":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/","title":{"rendered":"Account Deactivation Scam"},"content":{"rendered":"<p>The end of the semester is prime time for scammers to target 51ÁÔÆæ students. The newest type of scam involves multiple steps to gain access to your 51ÁÔÆæ account. Here\u2019s what you can look out for:<\/p>\n<ol>\n<li>You may receive an email saying it is the Help Desk, or Microsoft Support, and your account will be deactivated.<\/li>\n<li>The email has a link taking you to Google form where you enter your personal information, including your phone number.<\/li>\n<li>You receive a text message pretending to be the Help Desk or Microsoft Support asking for your authentication code (MFA).<\/li>\n<li>Your account is now compromised.<\/li>\n<\/ol>\n<p>Once the scam is complete, this cycle continues with scammers sending out more of these emails. This also leads to job scam emails being sent.<\/p>\n<p><strong>How to protect yourself: <\/strong><\/p>\n<ul>\n<li>If you do not have a support request open, the 51ÁÔÆæ Help Desk will not contact you.<\/li>\n<li>51ÁÔÆæ Help Desk and Microsoft will not text or call to ask for your multi-factor code (MFA).<\/li>\n<li>Do not fill out any unexpected forms that are sent to you.<\/li>\n<li>If you are unsure about an email, verify its legitimacy with the 51ÁÔÆæ Help Desk. You can also forward the email to <a href=\"mailto:abuse@uwm.edu\">abuse@uwm.edu<\/a>, and a member of our cybersecurity team will help you verify the email.<\/li>\n<\/ul>\n<p>If you believe you have been targeted by this type of scam, please contact the <a href=\"https:\/\/uwm.edu\/technology\/help\/\">51ÁÔÆæ Help Desk<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The end of the semester is prime time for scammers to target 51ÁÔÆæ students. The newest type of scam involves multiple steps to gain access to your 51ÁÔÆæ account. Here\u2019s what you can look out for: You may receive an &hellip;<\/p>\n","protected":false},"author":19041,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[8],"tags":[],"class_list":["post-12321","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Account Deactivation Scam\" \/>\n<meta property=\"og:description\" content=\"The end of the semester is prime time for scammers to target 51ÁÔÆæ students. The newest type of scam involves multiple steps to gain access to your 51ÁÔÆæ account. Here\u2019s what you can look out for: You may receive an &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-07T18:53:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Account Deactivation Scam\",\"datePublished\":\"2025-05-07T18:53:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/\"},\"wordCount\":236,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/\",\"name\":\"Account Deactivation Scam - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-05-07T18:53:43+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Account Deactivation Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/","og_locale":"en_US","og_type":"article","og_title":"Account Deactivation Scam","og_description":"The end of the semester is prime time for scammers to target 51ÁÔÆæ students. The newest type of scam involves multiple steps to gain access to your 51ÁÔÆæ account. Here\u2019s what you can look out for: You may receive an &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/","og_site_name":"Technology Resources","article_published_time":"2025-05-07T18:53:43+00:00","twitter_card":"summary_large_image","twitter_creator":"@51ÁÔÆæ_IT","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/#article","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/"},"author":{"name":"","@id":""},"headline":"Account Deactivation Scam","datePublished":"2025-05-07T18:53:43+00:00","mainEntityOfPage":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/"},"wordCount":236,"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/","url":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/","name":"Account Deactivation Scam - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-05-07T18:53:43+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"Account Deactivation Scam"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/uwm.edu\/information-technology\/author\/"}]}},"acf":[],"meta_fields":{"_edit_last":["19041","19041"],"_yoast_wpseo_primary_category":["28","28"],"_yoast_wpseo_content_score":["90","90"],"_yoast_wpseo_inclusive_language_score":["90","90"],"_yoast_wpseo_focuskeywords":["",""],"_yoast_wpseo_keywordsynonyms":["",""],"_yoast_wpseo_estimated-reading-time-minutes":["2","2"],"_wp_old_slug":["alert-new-phishing-scam","alert-new-phishing-scam"],"_yoast_indexnow_last_ping":["1748380572"],"_edit_lock":["1755884079:19041"],"_uwm_wg_content_review_log":["a:1:{i:0;a:5:{s:11:\"reviewer_id\";i:0;s:6:\"status\";s:5:\"reset\";s:10:\"entry_date\";s:19:\"2026-03-01 02:13:54\";s:16:\"priority_content\";s:0:\"\";s:4:\"note\";s:43:\"Content review reset at start of new cycle.\";}}"]},"publishpress_future_action":{"enabled":false,"date":"2026-04-25 09:39:12","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/12321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/19041"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=12321"}],"version-history":[{"count":1,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/12321\/revisions"}],"predecessor-version":[{"id":15380,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/12321\/revisions\/15380"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=12321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=12321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=12321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}