Phishing and Spam

Phishing

The Information Security Office (ISO), in partnership with the Office of Information Technology (OIT), works continuously to reduce phishing and spam emails across the university. Users are encouraged to remain vigilant and report suspicious messages using available tools.

Reporting Phishing Emails

UTA provides a “Report Phishing” button within the email system.

  • Use the “Report Phishing” button in Outlook
  • Location may vary depending on your version
  • Refer to the UTA Knowledge Base for guidance
Report Phishing

If you interacted with a phishing email, forward the following to phish@uta.edu

  • Original message
  • Your response (if applicable)
  • Any follow-up communication

For assistance, contact: security@uta.edu

What is Phishing?

Phishing is a fraudulent attempt to obtain sensitive information by posing as a trusted source.

Attackers commonly target:

  • Usernames and passwords
  • Financial information
  • Social Security numbers
  • Other sensitive data

Common Indicators of Phishing


Suspicious Sender Information
  • Appears to come from a known organization
  • Contains subtle differences in email address
Urgent or Deceptive Messaging
  • Requests immediate action
  • Claims account issues or threats
Requests for Sensitive Information
  • Asks for passwords or personal data
  • Legitimate organizations will not request this via email
Malicious Links or Attachments
  • Links to unsafe websites
  • Attachments containing malware

Protective Measures

If You Interact with a Phishing Message

  • Report to phish@uta.edu
  • Monitor accounts for unusual activity
  • Change compromised passwords

Spam Email

Spam is unsolicited email sent in bulk to multiple recipients.

University Policy on Spam

The use of university systems to distribute unsolicited email is prohibited.

An email is considered spam if:

  • The recipient did not request it