messages sent and received electronically through an e-mail system

In an average month, APU sends and receives over 25 million emails. Phishing is the most common type of email cyber attack affecting organizations like ours. Phishing attacks can take many forms, but they all share a common goal of getting the email recipient to share sensitive information—such as login credentials, credit card information or bank account details—resulting in identity theft and usually financial loss.

As cyber criminals become increasingly more slick in their approach, arming the university community with information about the latest attack tactics is important.

See the latest Phishing and Spam Support article for the latest examples.

This video is restricted to APU faculty/staff/students. Visit to learn more about this and other great resources

Be Safe

  1. Keep a clean inbox.
    An overwhelming amount of email received daily by the university community is classified as spam, or unsolicited email. You can report suspicious emails by forwarding them to

  2. Know when to click.
    Clicking on links in suspicious and/or unsolicited email could result in a phishing or malware attack. Learn more about
    phishing , malware, and ways to identify suspicious email.

  3. Don’t Respond.
    Do not respond to emails asking for passwords or personal information.

  4. Keep it close.
    Do not leave laptops, tablets, or mobile devices unattended. Thieves can use this as an opportunity to access the information on your device or to steal your device.

  5. Get trained.
    The IMT Security Office will be launching a new training program in Summer 2020.

What to do if You Receive a Suspicious Email

Forward suspicious emails to