Skip to content

How To

Email Best Practices

Cybercriminals often use email as the primary way to begin their attack campaigns here at Clemson. Always remember to be aware of and adhere to the Clemson Electronic Mail (Email) Policy. Below are some recommended best practices to help keep you and your account information safe.

 

Best Practices

Your Clemson Email

Do not use your Clemson email account for external personal sites, such as social media, streaming services, online shopping, or banking. Use a personal email account instead.

Immediate Action Emails

Beware of email requests asking for immediate action. Cybercriminals are hoping that you won’t be thinking clearly if you are under pressure.

Email Authenticity

When in doubt about an email, you can verify the authenticity by checking the sender’s email address and contact information or reaching out to them via another means of communication.

Impersonators

Watch for lookalike email addresses that attackers may use to impersonate a Clemson address, like clemson.edu@google.com or support@c1emson.com. 

Unknown Links

Avoid clicking on links within an email, because they may not actually take you to the expected web address. Consider these more secure options:

  • If you are familiar with the website, open a browser and navigate to the website yourself.
  • If a link is shortened or masked, you can use a URL checking site like URLVoid to verify the destination reputation.

Reporting Phishing Emails

If you receive a suspicious email, report it using the Report Phishing button in Outlook or forward it to phishing@clemson.edu