  {"id":16200,"date":"2026-03-17T14:08:34","date_gmt":"2026-03-17T19:08:34","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?p=16200"},"modified":"2026-03-17T14:08:36","modified_gmt":"2026-03-17T19:08:36","slug":"how-to-handle-a-phishing-email","status":"publish","type":"post","link":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/","title":{"rendered":"How to Handle a Phishing Email"},"content":{"rendered":"\n<p>If you receive an email that makes you pause or confuses you, do not click on anything or reply\u00a0to the message.\u00a0Use the information below to help guide you in staying safe online. To learn more about phishing and other cybersecurity topics visit our webpage: <a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\" type=\"link\" id=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\">uwm.edu\/cybersecurity<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-signs-of-a-phishing-email\">Signs of\u00a0a\u00a0Phishing\u00a0Email<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>An unknown sender.\u00a0<\/li>\n\n\n\n<li>Known sender, odd email address (Ex:\u00a0the name of someone from 51ÁÔÆæ, but\u00a0it is\u00a0not a 51ÁÔÆæ email address).\u00a0<\/li>\n\n\n\n<li>Urgent language,\u00a0asking\u00a0you to do\u00a0an action\u00a0quickly.\u00a0<\/li>\n\n\n\n<li>Request\u00a0for\u00a0personal information, MFA verification code,\u00a0or some form of payment.\u00a0<\/li>\n\n\n\n<li>A\u00a0link or attachment that you were not expecting.\u00a0<\/li>\n\n\n\n<li>Spelling\/grammar errors, does not appear\u00a0to have the correct format or branding.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-to-do\">What to Do<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not reply or open any links\/attachments.\u00a0<\/li>\n\n\n\n<li>Report the email to\u00a0<a href=\"mailto:abuse@uwm.edu\" target=\"_blank\" rel=\"noreferrer noopener\">abuse@uwm.edu<\/a>. 51ÁÔÆæ\u2019s Information Security Team will review the email for you and confirm if it is a\u00a0scam.\u00a0<\/li>\n\n\n\n<li>If you believe you have\u00a0clicked on or responded to a phishing message, contact the\u00a0<a href=\"https:\/\/uwm.edu\/information-technology\/help\/\" target=\"_blank\" rel=\"noreferrer noopener\">51ÁÔÆæ Help Desk<\/a>.\u00a0\u00a0<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>If you receive an email that makes you pause or confuses you, do not click on anything or reply\u00a0to the message.\u00a0Use the information below to help guide you in staying safe online. To learn more about phishing and other cybersecurity &hellip;<\/p>\n","protected":false},"author":13719,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[8],"tags":[],"class_list":["post-16200","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Handle a Phishing Email\" \/>\n<meta property=\"og:description\" content=\"If you receive an email that makes you pause or confuses you, do not click on anything or reply\u00a0to the message.\u00a0Use the information below to help guide you in staying safe online. To learn more about phishing and other cybersecurity &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T19:08:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T19:08:36+00:00\" \/>\n<meta name=\"author\" content=\"Amanda R Brickner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:site\" content=\"@51ÁÔÆæ_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amanda R Brickner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/\"},\"author\":{\"name\":\"Amanda R Brickner\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\"},\"headline\":\"How to Handle a Phishing Email\",\"datePublished\":\"2026-03-17T19:08:34+00:00\",\"dateModified\":\"2026-03-17T19:08:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/\"},\"wordCount\":180,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/\",\"name\":\"How to Handle a Phishing Email - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2026-03-17T19:08:34+00:00\",\"dateModified\":\"2026-03-17T19:08:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/how-to-handle-a-phishing-email\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Handle a Phishing Email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#\\\/schema\\\/person\\\/9b3157bbbbefcf45625810581c9a4bcb\",\"name\":\"Amanda R Brickner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g\",\"caption\":\"Amanda R Brickner\"},\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/author\\\/amandabuwm-edu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/","og_locale":"en_US","og_type":"article","og_title":"How to Handle a Phishing Email","og_description":"If you receive an email that makes you pause or confuses you, do not click on anything or reply\u00a0to the message.\u00a0Use the information below to help guide you in staying safe online. To learn more about phishing and other cybersecurity &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/","og_site_name":"Technology Resources","article_published_time":"2026-03-17T19:08:34+00:00","article_modified_time":"2026-03-17T19:08:36+00:00","author":"Amanda R Brickner","twitter_card":"summary_large_image","twitter_creator":"@51ÁÔÆæ_IT","twitter_site":"@51ÁÔÆæ_IT","twitter_misc":{"Written by":"Amanda R Brickner","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/#article","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/"},"author":{"name":"Amanda R Brickner","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb"},"headline":"How to Handle a Phishing Email","datePublished":"2026-03-17T19:08:34+00:00","dateModified":"2026-03-17T19:08:36+00:00","mainEntityOfPage":{"@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/"},"wordCount":180,"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/","url":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/","name":"How to Handle a Phishing Email - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2026-03-17T19:08:34+00:00","dateModified":"2026-03-17T19:08:36+00:00","author":{"@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb"},"breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/how-to-handle-a-phishing-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"How to Handle a Phishing Email"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/uwm.edu\/information-technology\/#\/schema\/person\/9b3157bbbbefcf45625810581c9a4bcb","name":"Amanda R Brickner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7cadce68f31dfcc11d73732eca5d58148e867a315b2252c9404f4768f2274054?s=96&d=mm&r=g","caption":"Amanda R Brickner"},"url":"https:\/\/uwm.edu\/information-technology\/author\/amandabuwm-edu\/"}]}},"acf":[],"meta_fields":{"_edit_lock":["1773774518:13719"],"_edit_last":["13719"],"feat_img_video":[""],"feat_img_gallery":[""],"feat_img_caption":["feat-img-caption-on"],"breadcrumbs_display":["breadcrumbs-on"],"otp_nav_display":["otp-on-mobile"],"post_layout":["post-layout-theme"],"_yoast_wpseo_primary_category":["8"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_inclusive_language_score":["90"],"_yoast_wpseo_focuskeywords":[""],"_yoast_wpseo_keywordsynonyms":[""],"_yoast_wpseo_estimated-reading-time-minutes":["1"],"_yoast_indexnow_last_ping":["1773774516"]},"publishpress_future_action":{"enabled":false,"date":"2026-04-24 15:36:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/13719"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=16200"}],"version-history":[{"count":2,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16200\/revisions"}],"predecessor-version":[{"id":16202,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/16200\/revisions\/16202"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=16200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=16200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=16200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}