”TigerEmail Best Practices

Cybercriminals often use email as the primary way to begin their attack campaigns here at Clemson. Below are some recommended best practices to help keep you and your account information safe.

  • Do not use your Clemson email account for external personal sites, such as social media, streaming services, online shopping, or banking. Use a personal email account instead. 
  • Beware of email requests asking for immediate action. Cybercriminals are hoping that you won’t be thinking clearly if you are under pressure. 
  • When in doubt about an email, you can verify the authenticity by checking the sender’s email address and contact information or reaching out to them via another means of communication. 
  • Watch for lookalike email addresses that attackers may use to impersonate a Clemson address, like clemson.edu@google.com or support@c1emson.com. 
  • Avoid clicking on links within an email, because they may not actually take you to the expected web address. Consider these more secure options: 
    • If you are familiar with the website, open a browser and navigate to the website yourself.
    • If a link is shortened or masked, you can use a URL checking site like https://www.urlvoid.com/ to verify the destination reputation.

     

  • If you receive a suspicious email, report it using the Report Phishing button in Outlook or forward it to phishing@clemson.edu 
  • Be aware of and adhere to the Clemson Electronic Mail (Email) Policy:
    https://clemsonpub.cfmnetwork.com/B.aspx?BookId=11100&PageId=456767