This is likely a Phishing email. Phishing is designed to trick the recipient into revealing personal information to individuals who intend to use it for fraudulent purposes. Generally, the context of the message will ask the recipient to provide personal and/or account information for verification purposes.
Please be advised that Information Technology will never ask for any of your APS account or personal information by email or any other electronic means.
If you receive any messages requesting you to revalidate your account, you should ignore the request and forward email to
firstname.lastname@example.org, afterwards delete the message immediately. If you have already responded to any messages of this nature, please login to the APS domain and change your password immediately, and contact the APS Service Desk at 404-802-1000.
What should I do if I am receiving spam mail?
Please report spam by forwarding the email to email@example.com , and/or the APS Service Desk at firstname.lastname@example.org, 404-802-1000.
How do I request for a website to be unblocked?
APS staff can use their login credentials to override blocked websites for 60 minutes, as long as the website is not in a forbidden category. Go to www.blockpage.com and enter network id and password and click the override button.
What is confidential data?
Confidential data is any information you don't want others to obtain without your permission, including (but not limited to) your Social Security number, home address, phone numbers of friends/family/colleagues/students, your driver's license or bank account numbers, a list of your passphrases, your home address or phone numbers, your employee ID number, digital images, word documents containing personal text, etc.
Most people store confidential data of some kind on their computers within Word files, address books, or application settings.
What risks are involved if someone gets my information?
If unauthorized persons gain access to the confidential information you are storing, they could alter the information or use it to commit identity theft.
What can I do to protect myself and my information?
- Only store confidential information on your computer if it is absolutely necessary.
- Store confidential information on portable media, such as a CD or flashdrive. Secure the portable media in a locked cabinet when it is not being used.
- Encrypt files containing confidential data. Encryption is available on some operating systems.
- Physically secure your computer (laptop or desktop) to the desk where it sits. For about $30, you can buy a simple cable lock (similar to a bike lock) at any tech-supply store that will deter and usually prevent theft.
- Set your computer to ask you for an account passphrase at login, this is already required on APS computers. If someone is sneaking onto your computer, this tactic will prevent them from gaining access to your files. For instructions on setting passphrases, refer to your operating system help center.
- Be sure to disable the "Guest" account, as use of this account is likely to be untraceable.
- For questions please contact APS IT Security at email@example.com
Are there email attachment restrictions?
To help prevent the spread of viruses, there are certain attachment types prevented from entering the APS email system.
If someone sends you an email message with a file attached and that file is one of the restricted file types, you will not receive the attachment. You will still receive the email message, but the attachment will be removed.
How will I know if attachments are removed from email messages I send/receive?
Recipients will receive a message clearly stating that an attachment was removed, the name of the attachment, why the attachment was removed, and options for resending the attachment as an unrestricted file type. However, senders of restricted file types will not receive notification that the attachment was removed.
What can I do if a file type I want to send is on the restricted list?
Consider renaming the file to an unrestricted file type. Or, use Web-based file-sharing, or removable media (e.g., a flash drive).
Are all attachments I receive safe?
No. Use caution when opening email attachments. Do not open attachments you were not expecting or from senders you don't know. If you receive an unexpected attachment from someone you do know, please validate that the person actually sent the email. Attachment restrictions reduce, but might not eliminate, the number of virus-infected attachments that reach the campus.