Frequently Asked Questions

Welcome to the Information Security FAQ page. Discover answers to some of the most commonly asked questions. If you don't find your query here, please email and one of our Office of Information Security team members will route your question to the appropriate resource.

If you encounter immediate threats to people or property, contact the UC Police Department at (513) 556-1111, or dial 911 in emergencies. For security incidents, misuse of university computing resources, or suspicious behavior that could indicate a potential threat, please contact the Office of Information Security. You can reach us at 513-558-ISEC (4732) or email For more in-depth information on reporting, please visit our dedicated Report an Incident page.

Phishing is a common form of social engineering where threat actors use deceptive emails, texts (smishing), or phone calls (vishing) to manipulate you into disclosing private information or performing actions that compromise security.

To stay vigilant against phishing attempts:

  • Verify the Sender: Always check the sender's identity to ensure the email is from a legitimate source.

  • Be Cautious with Links and Attachments: Avoid clicking on links or opening attachments from unknown or suspicious sources.

  • Report Suspicious Emails: If you receive an email that seems suspicious, use the “Report” button in Outlook. Alternatively, you can forward the email to for further investigation by our security team.

Remember, staying alert and informed is your best defense against these deceptive tactics. If you're ever in doubt, it's better to verify and report.

For more details on identifying phishing attempts, please reference our dedicated Phishing page.

Generally, it's safe to click unsubscribe links from known and reputable senders. However, be cautious with unknown sources as they might be phishing attempts. When in doubt, mark the email as spam and adjust your email filter settings.

Utilize the mail filtering options of your UC email system. Mark unwanted emails as spam to train your mail client. Be cautious when sharing your email address and read the privacy policies of websites and forms where you provide your email.

QR codes are generally safe but can be misused. Always check for signs of tampering and avoid scanning codes that seem out of place. Be wary of QR codes that lead to login pages or request personal information.

Protecting your personal information involves several key steps:

  • Use Strong Passwords: Create unique, strong passwords for your university accounts and change them regularly. 

  • Enable Two-Factor Authentication: Wherever possible, use two-factor authentication for an added layer of security.

  • Be Cautious on Public Wi-Fi: When using public Wi-Fi networks, avoid accessing sensitive information. Consider using a VPN for enhanced security. 

  • Regularly Update Software: Keep your devices and applications updated with the latest security patches.

  • Educate Yourself: Participate in cybersecurity awareness programs offered by the university to stay informed about the latest security practices and threats. 

Yes, but it's crucial to follow best practices for security:

  • Separate User Accounts: Use different user accounts for personal and university work.

  • Secure Storage: Store university data in approved, secure cloud services or university drives.

  • Device Security: Ensure your personal device has updated antivirus software and a strong firewall. 

  • Physical Security: Never leave your device unattended in public places.

For updates, upcoming events, and security education resources, check out our Education & Awareness page.