Email - Malware Notice

Fraudulent and/or Malicious Email Notice

The Alliant IT Department and our Service Provider continually take steps to block all types malicious messages. Cyber criminals also continually work to circumvent cyber-security systems.

Please mark questionable emails as spam, do not click links within them and  do not open any associated attachments. If you have selected malicious links or opened malicious attachments, please contact the IT Helpdesk immediately so arrangements are made to check your computer.

If you are unsure if an email is valid please don't hesitate to contact the IT Helpdesk. They will be able to advise you or involve a department technician as needed.
Helpful Suggestions:
Please note some telltale signs of fraudulent email.
            The message was not sent from an email address or someone you regularly do business with
            The To: field has a vague or non-descriptive name
            The Subject: field is questionable
            The spelling and grammar in the message is incorrect
            The address link is not associated with the or known domain
            The signature line is not from a specific Alliant department, individual or know associate
Our Helpdesk is available for your questions or concerns by email at or by phone at 858-635-4357, Option 1.
DocuSign Fraud:

First and foremost, if you don’t recognize the sender of a DocuSign envelope and you are uncertain of the authenticity of an email, look for the unique security code at the bottom of the notification email. All DocuSign envelopes include a unique security code. If you do not see this code DO NOT click on links or open attachments within the email. 

Access your documents directly from by simply entering the unique security code provided. For more information, please review our Combating Phishing guide


Warning: Ransomware email
Recently we have seen instances of email that contain a particularly malicious software known as Ransomware. When the malicious email attachment is selected it can install software that encrypts your files. This will prevent your access until the encryption is unlocked by the perpetrator who demands a ransom in order to do so. Further information is available at

Did you find this article helpful?