Topics Map > Client Services
Cyber Security - Phishing - How to spot
Phishing is when someone tries to obtain your confidential or financial information through deceptive emails or messages. Examples include an email claiming to be from a friend asking you to wire money, or a message claiming you won a prize but need to provide your bank account information to collect it.
Bottom line: If you are unsure whether an email is legitimate, do not click any links. Contact the Eagle Help Desk (opens in new tab) if you need help verifying an email.
What to Look For in a Phishing Email
- Sent from a non-university email address: Always check the sender's full email address, even if the email signature looks legitimate.
- Appears to be from someone you know: Contact that person through a different method you have used before to verify they sent it.
- Inconsistencies in addresses or URLs: Look for added characters, numbers, or misspellings — for example, www.uw1ax.edu (number 1 instead of letter l) or uwlax.@edu.
- Poor grammar and spelling: Phishing emails often contain misspellings, mismatched capitalization, or unusual formatting.
- Suspicious links, images, or attachments: Be wary of emails that ask you to click a link or open a file — for example, "See attached invoice" or "Install updates from..."
- Artificial urgency: Phrases like "Your account will be shut down if you don't respond" or "Your computer has a virus — click here to remove it" are designed to pressure you into acting without thinking.
- Requests for action through conversation: Some phishing attempts build trust over multiple messages before asking you to buy gift cards or share personal information.
- Offers that seem too good to be true: If it sounds too good to be true, it almost certainly is.
Using a Smartphone?
Be extra cautious when checking email on a mobile device:
- If you're unsure about an email, wait until you're at a computer before clicking any links.
- On a computer, you can hover over a link with your mouse — without clicking — to preview the actual URL before opening it.
- Be especially cautious with unexpected attachments on mobile, as it's harder to inspect them safely.
What to Do If You Receive a Suspicious Email
- Don't click any links or open any attachments.
- Report it. In Outlook, use the Report Message button to mark it as phishing. This helps protect the rest of the UWL community.
- Contact the Eagle Help Desk if you're unsure whether an email is legitimate, or if you already clicked a link. The sooner we know, the faster we can help secure your account. Reach us at helpdesk@uwlax.edu or 608-785-8774.
UWL IT Emails
Information Technology Services (ITS) will never ask for your password by email. If you receive any message requesting your password, delete it immediately without replying.
Anatomy of a Phishing Email
![Anatomy of a phishing email diagram using a fake Doodle poll invitation as an example. Four callouts identify red flags: (1) Sender address doodlestuff@phishydomain.info — labeled as a suspect domain name. (2) The email body uses the number 1 in place of the letter l in words like A11 and COV1D — labeled as numbers used as letters. (3) Urgent language reading Immediate Action Needed with a 48-hour deadline and a Participate Now button — labeled as immediate or urgent call to action. (4) The underlying link URL phishydomain.info/landing/[long string] — labeled as a suspicious web link.](/images/group264/84838/05-AnatomyOfAPhishingEmail.jpg)
Examples of Phishing Emails
The following are real examples of phishing emails received at UWL. Notice how they use the tactics described above.

Informative Videos About Phishing
These videos were created by UWL ITS to help you recognize and avoid phishing attacks:
Important: UWL IT will never ask for your password by email. If in doubt, don't click — contact the Eagle Help Desk (opens in new tab).
