Phishing remains one of the most common and effective pathways for cyberattacks on universities. Whether the target is a first-year student, a tenured faculty member or an administrative staff member, the consequences can include lost data, disrupted research, financial fraud and reputational harm. Below is a brief, factual and actionable guide to protect every campus community member.
Why this matters (three perspectives)
- Students: Credentials for campus systems and learning platforms are high-value and frequently reused — exposing personal information and access to services.
- Faculty: Research data, grant information and intellectual property are attractive targets; a single compromised account can derail projects.
- Staff: Administrative accounts often have privileges over payroll, procurement and sensitive records — making them prime phishing payoffs.
Practical protections you can adopt today
Assume caution, verify always
- Pause before clicking. Verify unexpected or urgent requests by contacting the sender through a known channel (not by replying to the suspicious email).
- Inspect sender addresses carefully — look beyond display names for domain spoofing.
Use strong, unique authentication
- Enable multi-factor authentication (MFA) on all accounts. Prefer hardware tokens or phishing-resistant methods where available.
- Avoid password reuse; use a reputable password manager.
Treat links and attachments as potential threats
- Hover to preview URLs before clicking. If a URL looks unfamiliar, type the institution’s site address manually.
- Scan attachments with institutionally approved tools; be especially wary of compressed files and macros in documents.
Be aware of social engineering cues
- Red flags: unexpected urgency, requests for credentials or payments, odd salutations and slightly altered branding or grammar.
- Watch for conversational phishing delivered via SMS or social platforms.
Keep devices and software current
- Apply OS and application updates promptly and use institutionally managed endpoint protection where provided.
If you suspect phishing, act quickly
- Report immediately to your campus IT/security helpdesk using the official reporting channel.
- Do not forward the suspicious message to others; use the institution’s report mechanism so security teams can analyze and contain threats.
- Change credentials and review account activity if you clicked a link or provided information. Notify any affected collaborators.
A shared responsibility
Protecting our campus is everyone’s responsibility. Small, consistent actions — verification, MFA, careful handling of links and attachments and prompt reporting — dramatically reduce exposure and keep students, faculty, and staff safe.
Remember to #becybersafeUCLA!
Learn more about Cybersecurity Awareness Month at UCLA — and enter the raffle for a chance to win tickets to the UCLA vs. USC football game — by visiting Cybersecurity Awareness Month 2025.