{"id":658,"date":"2024-08-12T16:14:33","date_gmt":"2024-08-12T20:14:59","guid":{"rendered":"https:\/\/www.adelphi.edu\/it\/?page_id=658"},"modified":"2025-09-16T14:42:01","modified_gmt":"2025-09-16T18:42:01","slug":"phishing","status":"publish","type":"page","link":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<h2>How to Keep Your Data Safe at Adelphi<\/h2>\n<ul>\n<li><strong>Never share sensitive information. <\/strong>Never share your password or banking details in Google Forms or other untrusted forms. Always sign in through Single Sign-On (SSO) for <a href=\"https:\/\/portal.adelphi.edu\/\" target=\"_blank\" rel=\"noopener\">eCampus<\/a>, and remember that no one at Adelphi will ever ask for your password. Enable <a href=\"https:\/\/www.adelphi.edu\/it-services\/multifactor-authentication\/\">multifactor authentication (MFA)<\/a> and keep your <a href=\"https:\/\/portal.adelphi.edu\/retrieve-password\/?email=\" target=\"_blank\" rel=\"noopener\">password<\/a> and recovery methods up to date.<\/li>\n<li><strong data-start=\"588\" data-end=\"624\">Use secure devices and websites.<\/strong> Look for \u201chttps\u201d and a lock icon when submitting sensitive information online. Keep your operating system, software, and antivirus programs updated, and back up important files regularly.<\/li>\n<li><strong data-start=\"818\" data-end=\"861\">Stay cautious and get help when needed.<\/strong> If something seems suspicious or you\u2019re unsure, contact the <a href=\"https:\/\/www.adelphi.edu\/it\/support\/\">IT Help Desk<\/a> before taking any action.<\/li>\n<\/ul>\n<h2 data-start=\"104\" data-end=\"147\">How We\u2019re Enhancing Your Email Security<\/h2>\n<p data-start=\"149\" data-end=\"678\">To bolster our defenses against sophisticated phishing attacks, Adelphi University also uses <a href=\"https:\/\/www.adelphi.edu\/it-services\/abnormal-ai\/\">Abnormal AI<\/a> to help detect and block phishing and other email-based threats. This advanced protection works behind the scenes to keep your Gmail account safer and more secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>How to Keep Your Data Safe at Adelphi Never share sensitive information. Never share your password or banking details in Google Forms or other untrusted forms. Always sign in through Single Sign-On (SSO) for eCampus, and remember that no one at Adelphi will ever ask for your password. Enable multifactor authentication (MFA) and keep your&hellip;<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":27,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-658","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<title>Phishing | Information Technology<\/title>\n<meta name=\"description\" content=\"Learn how to recognize phishing scams, protect your Adelphi account, and take action if you\u2019ve clicked on a suspicious link or shared information by mistake.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adelphi.edu\/it\/security\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing | Information Technology\" \/>\n<meta property=\"og:description\" content=\"Learn how to recognize phishing scams, protect your Adelphi account, and take action if you\u2019ve clicked on a suspicious link or shared information by mistake.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adelphi.edu\/it\/security\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-16T18:42:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>","yoast_head_json":{"title":"Phishing | Information Technology","description":"Learn how to recognize phishing scams, protect your Adelphi account, and take action if you\u2019ve clicked on a suspicious link or shared information by mistake.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/","og_locale":"en_US","og_type":"article","og_title":"Phishing | Information Technology","og_description":"Learn how to recognize phishing scams, protect your Adelphi account, and take action if you\u2019ve clicked on a suspicious link or shared information by mistake.","og_url":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/","og_site_name":"Information Technology","article_modified_time":"2025-09-16T18:42:01+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/","url":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/","name":"Phishing | Information Technology","isPartOf":{"@id":"https:\/\/www.adelphi.edu\/it\/#website"},"datePublished":"2024-08-12T20:14:59+00:00","dateModified":"2025-09-16T18:42:01+00:00","description":"Learn how to recognize phishing scams, protect your Adelphi account, and take action if you\u2019ve clicked on a suspicious link or shared information by mistake.","breadcrumb":{"@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adelphi.edu\/it\/security\/phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.adelphi.edu\/it\/security\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.adelphi.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security","item":"https:\/\/www.adelphi.edu\/it\/security\/"},{"@type":"ListItem","position":3,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.adelphi.edu\/it\/#website","url":"https:\/\/www.adelphi.edu\/it\/","name":"Information Technology","description":"Just another Adelphi Sites site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adelphi.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"new_scheduled_revision":"","save_as_revision":"","_links":{"self":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/658"}],"collection":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/comments?post=658"}],"version-history":[{"count":24,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/658\/revisions"}],"predecessor-version":[{"id":753,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/658\/revisions\/753"}],"up":[{"embeddable":true,"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/pages\/27"}],"wp:attachment":[{"href":"https:\/\/www.adelphi.edu\/it\/wp-json\/wp\/v2\/media?parent=658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}