Main Menu

Email and web surfing precautions

Email and the web are critical tools for both your learning/teaching and social experience here at Shepherd, and your life outside of Shepherd. Like any tool, these may be used to assist you in your life; but they can also be used by those with malicious purposes in mind. Sometimes it is easy to tell when an email or website has a malicious purpose, but not always. Please be cautious in your use of the web and email system, and diligent to not be taken in by the traps and snares of the malicious ones.

While Shepherd University’s IT Services staff is diligent in trying to stop spam and malicious content from getting through to end-users, some still filters through. It is up to each person to be as educated as possible as to what to look out for, how to handle it when they see it, and how to be diligent in keeping themselves and their fellow users computing environment safe.

Here is a Exploits Definitions page with basic definitions for exploits and malicious activities to use as a reference so you are familiar with the terminology.

Below are some tips to keep in mind when looking at an email, or a web site you are directed or surf to. These are not comprehensive so please use them as a guideline.

Emails:


Web sites:


Use your best judgment. If you are unsure about an email you receive, or a website you are visiting, is legitimate or not, please contact us. Send an email with all of the information you can, without divulging any private information, to itworkorder@shepherd.edu. Include your contact information. This will create a ticket in our system so we may take a look at it and communicate back with its legitimacy.

To report a phishing attack or email with a malicious payload in the attachment, or a malicious web site, please send all of the information you can about it to itworkorder@shepherd.edu. This will create a ticket in our system to make us aware of it.

Better to ask to make sure than to have your private information and/or computer compromised, along with the information and computers of others.