Welcome to ITS Cybersecurity eNews | February 2024 | Issue 11

Cybersecurity image banner

Spotting & Protecting Yourself Against a Cyber Threat

Today's newsletter is 489 words... a 1.8-minute read.

Threats can come to your Inbox...

Image of a cyber warrior.

The problem: Threats in the form of phishing attempts are a harsh reality in today's digital world. How do you protect yourself?


The solution: While Information Technology Services (ITS) took steps to secure university email, increased awareness is needed by everyone. You can take steps to improve your cybersecurity awareness.


In this issue, we focus on two key areas surrounding phishing:


1) How to spot and safeguard yourself from phishing emails


2) What to do if you suspect you've inadvertently fallen for a phishing attack

How to Spot a Phishing Email



The below graphic indicates suspicious elements of a phishing attempt via email.


Other indicators include:



  • Spelling errors and poor grammar - Professional companies and organizations usually have editorial staff to ensure high-quality content.


  • Generic greeting - Organizations that work with you should know your name. This can be a warning sign that it's not really the person or company.



Click to Learn More

Threats can also come to your text messages...

How to Spot a Phishing Text


When a scammer uses a text instead of an email, it’s just another kind of phishing attack called a “smish,” short for SMS phish.


Hackers never miss an opportunity to trick you into doing what they want. Some smishing scams impersonate companies you do business with - your bank, cell phone provider, cable company, etc.


How can I tell if it might be a smishing scam? Any text attempts containing: “Congratulations, you’re a winner!”; “Urgent!”; and “Reply now!” These are not things you should ever pursue further.


Although strange-looking numbers can still be legitimate, really think before you click – and never click if you’re in doubt. Doing a quick search online for the number in question may reveal it to be a scam number. 

You CAN protect yourself against these threats...

How to Safeguard Yourself


  • ONLY click links or open attachments from sources you know.


  • Be cautious with emails and texts received, especially if you are not expecting them. DON'T respond to unsolicited emails and text messages that have calls to action unless you are expecting them. If you are not expecting it, it is probably fake.


  • BLOCK/DELETE any suspicious emails and texts received immediately!


  • ONLY APPROVE DUO REQUESTS THAT YOU HAVE INITIATED. When in doubt, verify the origin of the request.


  • Set up 2-step verification on any of your personal email accounts.


  • Avoid public WiFi, or immediately connect to FGCU's VPN after connecting to an open WiFi network.



  • Review annual cybersecurity training in Workday learning.
Woman sitting in front a laptop worried that she just got hacked.

What to Do If You Suspect Your Account

May Be Compromised


1) Shut down the device.




2) If FGCU account, contact the Help Desk immediately (see contact info below). For other accounts, please contact the company immediately.




Click to Learn More

Remember, that YOU are your best defense against cyber attacks. Stay diligent!

Like to see a specific cybersecurity topic covered?
Send your suggestion to: [email protected]
Need to Report an Issue or Have a Question?

Contact the University Help Desk:


[email protected] or 239.590.1188



Be your own help desk, click to visit the Knowledge Base

Empowering the University Community to achieve new digital possibilities