Fraudulent and/or Malicious Email Notice
The Alliant IT Department and our Service Provider continually take steps to block all types malicious messages. Cyber criminals also continually work to circumvent cyber-security systems.
Please mark questionable emails as spam, do not click links within them and do not open any associated attachments. If you have selected malicious links or opened malicious attachments, please contact the IT Helpdesk immediately so arrangements are made to check your computer.
If you are unsure if an email is valid please don't hesitate to contact the IT Helpdesk. They will be able to advise you or involve a department technician as needed.
Please note some telltale signs of fraudulent email.
The message was not sent from an alliant.edu email address or someone you regularly do business with
The To: field has a vague or non-descriptive name
The Subject: field is questionable
The spelling and grammar in the message is incorrect
The address link is not associated with the alliant.edu or known domain
The signature line is not from a specific Alliant department, individual or know associate
Our Helpdesk is available for your questions or concerns by email at email@example.com or by phone at 858-635-4357, Option 2.
First and foremost, if you don’t recognize the sender of a DocuSign envelope and you are uncertain of the authenticity of an email, look for the unique security code at the bottom of the notification email. All DocuSign envelopes include a unique security code. If you do not see this code DO NOT click on links or open attachments within the email.
Access your documents directly from www.docusign.com by simply entering the unique security code provided. For more information, please review our Combating Phishing guide.___________________________________________________________________________________
Warning: Ransomware email
Recently we have seen instances of email that contain a particularly malicious software known as Ransomware. When the malicious email attachment is selected it can install software that encrypts your files. This will prevent your access until the encryption is unlocked by the perpetrator who demands a ransom in order to do so. Further information is available at http://www.trendmicro.com/vinfo/us/security/definition/Ransomware