Junk & Fraudulent Email
There are several types of unwanted emails. Here are brief descriptions of the ways Outlook handles each of them.
- Clutter Folder: Microsoft defines clutter as emails you are least likely to look at, such as ads or promotions. Microsoft automatically moves these to your Clutter folder. View instructions on how to mark an email as clutter, manage your clutter folder, and more here.
- Junk Folder: Typically, Microsoft defines an email as "junk" when it is not from a trusted site or if it comes multiple times a day. ‘Spam’ email fits in this category. View more information on Junk emails and how to manage the Junk folder here.
- Quarantine Folder: Quarantine is a state of storage in which the messages have been identified as spam, bulk emails or any preference the user might have set. View instructions on how to manage the Quarantine folder and what messages are quarantined automatically here.
- Phishing Email: A ‘phishing’ email tries to trick you into giving out your personal information such as your password, bank account information, or Social Security number. Delete these emails without clicking on any links within them.
Fraudulent email use is prevalent and sophisticated, therefore hard to stop or avoid. All emails should be examined with this in mind. Many times the purpose of a scam or phish email is to access your email account and contacts in order to send more fraudulent emails.
Drury email addresses or those of friends or relatives are often used by scammers to convince you the email is legitimate. Before responding in any way to an email, watch for the following characteristics:
- Never reply to an email that asks you to send personal or account information. Your bank or credit card company will never ask for account or personal information in an email.
- If you receive an email that looks suspicious or asks you for private information, never click links or open attachments; just delete it.
- Emails that give deadlines and create a sense of urgency are trying to distract and panic you. This is an indication that they are fraudulent.
- Legitimate companies will link you to their website. To check on a link, place your cursor over it without clicking on it. The actual web address will appear above it. If that address doesn’t match the sender or seems unusual, don’t click on it; just delete the email.
- Check the spelling and grammar. Often there will be misspellings, singular nouns instead of plural ones and incorrect punctuation in scam emails.
- Never open any file attached to a suspicious-looking email.
- If the email appears to come from a company, contact the company's customer service via phone or web browser to see if the email is legitimate.
- Search the web for the email subject line followed by the word ‘hoax’ to see if anyone else has reported this scam.
- Be careful of job offers via email, especially those where you work outside of an office.
- Never provide information to anyone you didn’t contact first.
- Even if you recognize the email account, such as an email from someone at Drury, the email could be fraudulent. Check the content with the above information in mind. You may also want to ask yourself why the person is contacting you.
Clearing a Compromised Email Account
Here are indications your email account has been compromised:
- You stop receiving emails when you know you should have received some.
- People tell you they have received suspicious emails from you.
- You’re unable to send emails outside of Drury.
- Microsoft has sent you an email notification that you are not recognized as a ‘valid sender.’
If you have any of these issues, change your Drury password and take the following steps at once:
Remove Names from Permissions
From your Webmail account, right-click on the inbox folder, and select Permissions.
If there are any suspicious account names in the Permissions windows, highlight and delete them by clicking the trash can icon.
You should see None in all the Permission options.
Click OK when finished.
Remove Rules & Alerts
Hackers may create rules in your email account to keep you from knowing you’ve been hacked. The rules may be deleted in your Webmail account or from your account in the Outlook app.
From your Webmail account
Click on the gear icon at the top right of the screen and select Mail from the bottom of the Settings list.
From the Mail options in the left column, click on Inbox and sweep rules to see if there are any rules listed that you have not created. If no rules are listed, stop here.
If a rule that you did not create is listed, be sure the box next to the name is checked, then click on the trashcan icon above it. The rule will be deleted. Click Save at the top of the screen.
From the Outlook App
Click on the File tab at the top left of the Inbox screen.
Click on the box labeled Manage Rules & Alerts.
In the Rules and Alerts window, check any rules that you did not create and click on Delete at the top of the box. Click OK once the rules and the description below it are deleted.