91ºÚÁÏÍø

>

How to Write a Non-Phishy Email

University community members are taught to look for phishing red flags to protect themselves from potential scams and attacks. But have you ever given thought to the emails that you send? Do they look suspicious? Are you guilty of including red flags? If recipients think your legitimate email is spam or a phish,

  • they're less likely to respond to your call to action,
  • important information may get ignored,
  • it will unintentionally cause extra work, and
  • you may lose credibility with your audience.

Take the time to craft meaningful communications. Follow these best practices to help make it clear that your message is legitimate and not a scam.

The information included in the top section of the email (From, To, CC, BCC, Subject) gives the first impression. Make it a good one.

  • People tend to be more suspicious of emails from non-VU addresses (as they should be). Send emails from a university address (@vanderbilt.edu), where possible.
  • Sending emails from an external address is sometimes necessary. For example, many campus offices use 3rd party products and services, such as Oracle, Box.com, SerVU, etc., and it can be necessary to send emails from the product/service to notify users. In these cases,
    • Take extra care in constructing the body of your email. Include context and references.
    • Consider sending an awareness message from a university contact or leader first, letting people know that it is coming and is legitimate.
    • If it is going to be a mass email sent campus-wide, contact cybersecurity@vanderbilt.edu for more specific guidance.

Remember, just because it is from @vanderbilt.edu does not guarantee it is legitimate. Conversely, all emails from an external address are not inherently malicious. 

  • Include a clear subject line. Do not leave it blank.
  • Use BCC sparingly. Understand that using BCC, where all recipients are hidden, can increase suspicion. It can be incredibly helpful for avoiding reply-all mistakes or protecting recipient privacy, so sometimes it is warranted. If used, be sure to put extra thought and care into the body of the email message so that it has clear and meaningful explanation and context.
question icon

Not sure how to start?

Get in touch if you don’t know where to begin, you can’t find the guidance needed on the website, or if you just want to learn more. The Office of Cybersecurity has subject matter expertise and is here for 91ºÚÁÏÍø community to discuss security questions or concerns.