University of Redlands

Security Awareness

Phishing attacks have increased significantly and have become a starting point for several security incidents within an organization. In fact, 95% of cyber attacks are a result of phishing scams so phishing awareness training is essential.

How to spot a phishing email

Cybercriminals have gotten clever in how they design the emails they send out to make them look legitimate. But phishing emails often have the following characteristics:

     •  Ask you for personal information, such as your username and password, either by replying to the email or clicking on a link that takes you to a site where you’re asked to input the information. IMPORTANT: No one at our University will ever ask you for your password
     • Look like they come from someone you know - Don’t trust the display name – Look at the email address
     • Contain email addresses that don’t match between the header and the body, are misspelled (like, or have unusual formats (
     • Have links or email addresses that show a different destination if you hover over them
     • Contain poor spelling and grammar
     • Try to make you panic or create a sense of urgency about responding
     • Include threats or dire consequences if you don't act quickly
     • Seem too good to be true
     • Ask you to send money or purchase gift cards
     • Ask you to open an attachment or shared a document you may or may not be expecting
     • Ask to bypass policy/procedures or do something you wouldn’t normally do
     • Ask you not to tell anyone

Here is an example of a phishing email:

Mobile Devices

Using a mobile device you can view the email address by touching the address or Details or something similar. Each device and email client is different but each has a way to view the email address. Please review your device’s instructions on how to do this. To view a URL, touch and hold the link. This will display the actual URL.

How to read a URL (Uniform Resource Locater) address


URLs can be very long and complicated but don’t be intimidated. Reading them is not as hard as it looks and most of the URL can be ignored.

Fake URLs are obvious if you know how to read them.

The simple secret

  • Find the first single slash
  • Back up two dots from the first single slash
  • The true destination is between the slash and the second dot – this is the domain name

Now that you’ve found the domain name, how do you know it is not fake?

  • Domain names are hierarchical from right to left
    • Top level domain
      • edu (or .com, .org, .us, etc.)
    • Site domain
      • redlands (or google, yahoo, paypal, etc.)
    • Subdomain
      • www (or web, online, secure, logon, etc.)
  • Site domains and top level domains are registered – Subdomains are self-issued. So, subdomains can be whatever someone wants them to be. This is the www part. These can be decoys.
  • What’s wrong with this URL?
    • The first single slash is the secret!
    • Top level domain
      • biz
    • Site domain
      • ecomm
    • Subdomain
    • True destination –
    • DECOY –
  • The same can be done in reverse
    • Decoy domain after the slash

Excellent video with more details on how to spot fake URLs (12:20 minutes).


What you should do if you get a suspicious email

If you suspect that an email is a phishing email or scam:

     • Do not open any links or attachments in the email
     • Do not respond to requests for information or action
     • Report and click on “Report Message” in Microsoft Outlook
     • If you’ve already opened a link or attachment, immediately call Technology Support Services – or 909-748-8922