Phishing and spam attacks often happen whilst browsing the web or straight into your email inbox. There are serious repercussions to opening a suspicious email or link which could put you and the University at risk.

Phishing attacks

A video on how your information can be taken from you from the web and over email

Email

Email-distributed malware are emails that contain rogue attachments which could have software that intercepts your keystrokes,  may steal banking information or attempt to control your computer.

The University uses a spam filter to stop these emails reaching you, but we can't block all of them. Learn about spam quarantine.

Browsing the web

Scammers can mirror or copy websites that mimic a website, and  can contain key loggers that collect passwords and bank card details. Visit our Fake websites web page for more information.

Check the URL of the web page you are on - if the URL looks odd, it may be insecure. You can use this Google tool to check a URL or follow the guidance offered by DigiCert. If you are still unsure of a web page, please contact the ICT Service Desk

Web filtering

Whilst you're connected to the Imperial network, what you can browse online is restricted due to Web Filtering

Web filtering is intended to prevent facilities (software, computers, networks and offices) from being used to access illegal material.

If you attempt to access a site that is in the ‘block’ category of the web filter a message will appear on your web browser. It will inform you that the site you are attempting to access has been blocked by university policy. If you need access to the site, please contact the ICT Service Desk.

Web filtering is in line with the our current Conditions of Use of IT Resources policy.

Social media

  • Make sure you know exactly what you are sharing and who you are sharing it with.
  • Take time to understand and set up security settings. Most social networks allow you to control who sees what. 
  • Do not upload images or text to social media that you would not be happy for the world to see. Be aware that networks like Facebook, Twitter, Tumblr and Instagram are public spaces.
  • Always logout after use and keep your passwords secret. If you do not, your account could be hacked.

Cyberbullying

If you have been a victim of bullying or harassment there are many routes for support and advice. Please report any instance of cyberbullying to the ICT Service Desk.

Students

There are various support options available to you that are listed on the support for students webpage.

You can also speak to your academic or personal tutor.

Staff

You can access a range of support services, including confidential care, and can use the report and support tool.

Tips

  • If in doubt, do not click - if something doesn't look right, it probably isn't. 
  • Check your emails carefully - does the senders name match the email address? Hover over the links and check the URL it's pointing you to. Report messages that seem unusual using the report message add-in for Outlook
  • Report anything suspicious - If it looks suspicious do not open or click on any links. Report the email to the ICT Security team by attaching the suspicious email to an ASK incident.