How to report a Phishing email

Tags Phishing

Overview

Phishing is the practice of sending of sending fraudulent emails that pretend to be from reputable brands/sources, these emails are designed to steal personal information. This article will show you how to report these emails.

PhishForward

What is PhishForward?

PhishForward by Beauceron is a feature of Fleming’s email system that allows suspected phishing emails to be reported to IT staff for further investigation. 

When to use PhishForward

If you suspect an email is a phishing attempt, use the PhishForward feature to report it!

Use these 7 red flags of Phishing as a guideline:
Red Flag #1 – Urgent or Threatening Language
Red Flag #2 – Requests for sensitive information
Red Flag #3 – Anything too good to be true
Red Flag #4 – Unexpected emails
Red Flag #5 – Information mistakes
Red Flag #6 – Suspicious attachments
Red Flag #7 – Unprofessional design

How to use PhishForward

There are two ways you can report a suspected Phish:

1. In Outlook, click on the ‘Report a Phish’ button.  After making the report, the email is automatically deleted.

2. If not using Outlook, for example when on a mobile device, you can also forward the email directly to: phishreport@flemingcollege.ca

Using Outlook

When using Outlook to report a phish:

  • Select the email in question.
  • In the Home tab select Report a Phish.

  • Select the reason for reporting the email and if you have interacted with the email:

  • Note: You may optionally provide some additional information about why you think this email is a phish. E.g, Email requested sensitive information
  • Select Report Email.

You will receive confirmation like this:

  • Select Close and Delete.  The email will be deleted from your Inbox.

That’s it!  You’ve successfully reported a phishing attempt and removed the email.  A member of the IT staff may contact you for further information or actions if deemed appropriate.

Thank-you!

Was this helpful?
0 reviews
Print Article

Related Services / Offerings (1)

Report any computer-related security issues. Centralized reporting and review of suspected security incidents helps to ensure an appropriate response to protect your personal account, devices and any confidential data.