UCR's Storage Reclamation Efforts

In keeping with UCR's planned storage reclamation efforts, over-quota alumni and ineligible Google Workspace accounts were recently reset or deactivated, respectively. This process permanently deleted the data associated with these accounts. As a result, ITS is no longer able to offer any data recovery support.

Workaround for Student Registration Issues

UCR is aware of the registration issues that students are experiencing and is working with the vendor to resolve the root issue.  They have identified the defect and are committed to giving us a fix as quickly as they can. Until that time, a potential workaround is to refresh the page using Ctrl+F5 (Windows) or Cmd+Shift+R (Mac) to resolve blank pages or non-functional buttons without clearing the browser's cache and logging out and back in.

What to do if you Suspect Email Phishing at UCR

By ITS Staff |

What to Do If You Suspect Email Phishing at UCR

Phishing Simulation Campaign Blog Post Special Image

What is email phishing?

With electronic mail being a mainstay of personal and professional communication, malicious actors often utilize email in an attempt to steal personal or private information. Phishing emails are crafted to look legitimate but contain malicious programming or content used to capture sensitive data, which can put you and your workplace at risk.

How to identify email phishing?

Fortunately, there are simple ways to spot a phishing email. Here are some warning signs to look out for:

  • Bad grammar or punctuation 
  • Strange fonts or paragraph spacing 
  • Slightly modified email addresses 
  • Forms that ask for sensitive information like usernames and passwords
  • Links to strange websites
  • Requests for money from what appears to be a “trusted” person
  • Language that creates a sense of urgency or ultimatum (i.e., "If you do not respond immediately you will be sent to collections")

If you believe you have received a phishing email, please consider the following:

  1. If the potential phishing email appears to have come from an individual on-campus, don’t reply directly to the email.
    1. Pick up the phone and call the sender to verify its legitimacy.
    2. Create a new email and send it to the official address of the sender (see UCR Profiles) to verify its legitimacy.
  2. Remember, while there may be some similarities, email spam is not phishing. Here are some key differences between the two.

Phishing

Spam

Tends to be highly targeted. For example, it may include your name or company name.

Tends to be broader

Seeking personal information

Unwanted advertisements

Carry malicious links to non-legitimate websites

Often lead to a legitimate website

Has a sense of urgency in the call to action

May have less urgency in call to action

Notifying the UCR Information Security Office of Phishing Emails.

After considering all of the information above, if you still believe you have received a phishing email, please immediately notify the UCR Information Security Office (ISO). Instructions on how to notify the ISO can be found in this article - How to notify the UCR Information Security Office (ISO) of Suspected Email Phishing

Let us help you with your search