Digital Services » IT Services » Email Phishing and Spam
Phishing is the name given to the practice of sending emails purporting to come from a genuine company or organisation operating on the internet. The email attempts to trick the recipient into entering confidential information, such as credit card or bank details. The links contained within the message are false and often re-direct the user to a fake web site.
Many fake emails can look very convincing, complete with company logos and links that seem to take you through to the company website, although this too will be a fake.
The IT Service Desk will never send you an email requesting your username and password. In this context, do not respond to such emails and instead, report the email.
Remember, you can call us 24/7 365 days a year on 0300 500 5055 and we will be happy to help with any queries or concerns you may have.
We’re here to help. If you think you may have entered your details, then please contact us immediately 24/7 365 days a year and we’ll be happy to help.
Follow these steps if you think you may have entered your details into a phishing email:
WARNING: This email originated from outside University of Wales Trinity Saint David’s email system. Do not reply, click links, or open attachments unless you recognise the sender’s email address and know the content is safe.
If you see this warning message at the beginning of an email, the email was not sent to you by a UWTSD employee or student.
Emails received with this warning message where the sender purports to be a UWTSD employee or student should be reported. You should not open the email or click any links within it.
The following are all common phishing scams:
There are often clues which may help you spot that the email is fake:
You can find several phishing email examples directly on the phishing.org website. We highly recommend taking five minutes to read through their examples and information to familiarise yourself with a wide range of examples and what to look out for.
The below is an example of a phishing email sent to University addresses. Clues indicating that it is a scam message are highlighted.
From: support@uwtsd.ac.uk [mailto:willsk@eircom.eu]
Sent: Thu 05/02/2009 12:36
Subject: Dear student.uwtsd.ac.uk User
Dear student.uwtsd.ac.uk User
Your email account has been used to send numerous Spam mails recently from a foreign IP. As a result, the student.tsd.ac.uk has received advice to suspend your account. However, you might not be the one promoting this Spam, as your email account might have been compromised. To protect your account from sending spam mails, you are to confirm your true ownership of this account by providing your original username (*******) and PASSWORD (*******) as a reply to this message. On receipt of the requested information, the “student.uwtsd.ac.uk” web email support shall block your account from Spam.
Failure to do this will violate the student.uwtsd.ac.uk email terms & conditions. This will render your account inactive.
Thanks for using student.uwtsd.ac.uk
It is compulsory for all staff to complete the following short courses and videos:
You must also familiarise yourself with all IT Policies including the IT Acceptable Use Policy.
UWTSD runs quarterly phishing simulation exercises using Microsoft’s Attack Simulation tool. These are safe, controlled training exercises designed to help staff and students recognise and respond to real phishing attacks.
During these exercises, staff may receive emails that look like real phishing messages but are created solely to test awareness and improve our collective security.
These training exercises commonly mimic:
Phishing simulations are safe, controlled training exercises to help staff detect and respond to real phishing attacks.
These exercises are designed to build staff awareness and show how we might respond to real world phishing attempts.
Phishing remains the most common initial attack method globally and is implicated in a large share of data breaches — driving many successful breaches worldwide.
97% of higher and further education institutions reported experiencing phishing attacks, making it the most frequently reported attack type among UK universities. Government data shows 91% of UK universities encountered cyberattacks (including phishing) in the last 12 months, well above other sectors.
Many phishing breaches succeed because staff or students click malicious links or disclose credentials, bypassing technical controls.
Industry analyses show the “human factor” is a key part of over 90% of breaches — highlighting that technology alone cannot stop phishing
Any clicks on phishing emails links are captured, so that we are aware of what has been clicked on and when and you will be asked to complete cyber security refresher training. It’s important to note that the purpose of this exercise is learning and awareness — it’s not about catching anyone out or assigning blame, but we do ask that users learn from any mistakes.
It is expected that users do not make this mistake on more than one occasion in order to help reduce our risk when it comes to real phishing attempts. Line managers will be updated on the outcomes of the phishing exercises so that we can help increase awareness.
For users who click on simulated phishing links (or both clicks on the link and provides their credentials), Microsoft automatically assigns the below follow-up training to help build confidence in spotting similar messages in future and is a standard part of the security tooling.
If you click a simulated phishing link but do not provide credentials
If you click a simulated phishing link and provide credentials
The training is mandatory and takes approximately 10 to15 minutes per module. It is designed to help everyone stay confident in recognising potential threats and helps to strengthen the university’s overall security posture.
For each phishing simulation, UWTSD gather the following metrics for users who click on links and/or provide account details –
Note: Neither UWTSD nor Microsoft stores any credentials entered during a simulation.
The university is actively monitoring the training completion of assigned modules.
You can review your training status by visiting my training assignments
Defending the university against cybercrime and security threats is everyone’s responsibility.