How to protect yourself from phishing and viruses

Tags Phishing

How to protect yourself from phishing and viruses 

Attackers and scammers often look for ways to steal email addresses, passwords, and other sensitive information.  

What phishing looks like 

Phishing is an attempt by attackers to trick you into providing sensitive information by pretending to be a person or service you trust. 

Examples of phishing attacks: 

  • Emails that: 

  • Ask you to reply with your username/email and password 

  • Contain links to fake login pages or password reset pages 

  • Contain links to view or download a file from someone you don’t know 

  • Mention a current event, entice you with a prize or deal, or claim there’s an urgent reason for you to respond or click on a link 

  • Links on social network posts or comments that lead to fake login pages or password reset pages 

  • Phone calls, emails, or texts that appear like they’re from someone you know to get you to respond or click a link 

What malware and viruses look like: 

Malware is any malicious software that attackers try to get you to install so that they can steal your information or do harm to your files and computer. Malware includes things like viruses, adware, spyware, ransomware, trojan horses, and worms.  

Examples of malware attacks: 

  • Visiting a website, viewing an email, or clicking a pop-up window that installs software automatically 

  • Fake emails and websites that impersonate Dropbox or another trusted source 

How to tell if an email or website is officially from Mines 

Official Mines websites and emails will only appear on or come from any of our verified domains (such as and *  

You can view the email’s full headers to find out if it came from a phony or bogus address by doing the following: 


  1. While viewing the email, click “…” (More) in the upper right corner 

  1. Click Show original 

  1. Check the email address under From: 

Microsoft Outlook: Desktop or Web 

  1. Double-click the email to open it in a new window.  

  1. Select the File tab and click Properties. 

  • Web only: click Message Details (an envelope with a small document over it) 

  1. Check the email address under From: 

Apple Mail 

  1. Right-click the email and select View Source from the pop-up menu. 

  1. Check the email address under From: 

How to report something suspicious to ITS 

  • If you receive a suspicious email, forward the complete message to:  

  • If you receive a suspicious link, send an email to  and include a description of how you received the link and the full URL of the link. 

  • You can also contact us with other inquiries at the mines help center and if we determine it is a phishing, malware, or spam attempt, we’ll take immediate action. 

Tips to stay protected from phishing and malware 

Always check for the warning signs listed above before downloading a file or clicking a link. 


  • If you don’t trust a link in an email, go directly to the normal login or home page for the service (for example, typing instead of clicking on a link). 

  • If you’re not sure who an email is from, don’t click anything in the message. 

  • If you receive a suspicious message from someone at Mines, contact the person directly to verify that the message or link really came from them. 


  • Use strong passwords

  • Enroll in our multi-factor authentication (DUO) to protect your Mines accounts. 


  • Enable browser security and privacy settings to block phishing, malware, and other malicious sites in Chrome, Internet Explorer, Safari, Firefox, or your favorite browser. 

  • Install the latest updates for operating systems, browsers, software, and applications as soon as they become available, as they may have important security updates. 

  • Use anti-virus to protect your devices. 

  • Follow good security practices to protect your entire computer 



Article ID: 123613
Mon 1/4/21 2:59 PM
Fri 5/20/22 2:49 PM