Skip to main content
Learn More
Information Security

Information Security - FAQ

Information Security - FAQ

I've received a suspicious E-mail (phishing) - What should I do?

If you received the below email or similar, please ignore and delete it. This is a phishing attempt.

How can you quickly identify this message as a phishing attempt?
  • Email address does not match university name.
  • Hovering mouse over 'CLICK HERE' link does not match university name.
  • Poor grammar.
From: "awdclaims goog"
On Behalf Of: "TASC Help Desk"
Reply To: itdesk12 at

Take note of this important update that our new web mail has been improved
with a new messaging system from Zimbra which also include faster usage on
email, shared calendar, and web documents. Please use the link below to
complete your update for our new Zimbra improved web mail.

***Click on this link**

I've received unwanted E-mail (spam) - to whom should I report it?

Please alert us to the situation through

I'm receiving harassing E-mail - how can I stop it?

Please contact McNeese State University Police, as well as your local police department immediately.

Where can I download files legally?

EDUCAUSE maintains a list of legitimate download services.

How Can I Tell If I've Been Hacked?


If you receive multiple messages from the contacts in your address book, saying that they received spam email from your address, then your email account may have been hacked.

Note: Spam can be sent to random people and look as if it's coming from you, but it's actually coming from somewhere else ("spoofing"). However, if you are getting multiple reports from people that are listed in your contacts, someone/something may have gained unauthorized access to your account.


A successful attack on your computer may be difficult to discover.

A couple indicators may be:
  • An abnormal increase in internet or network activity. This often manifests as slow downloads or slow internet access when you know that you're not doing anything particularly demanding.

    Your computer may be being accessed remotely. This requires awareness of normal activity. A slow internet connection maybe harmlessly related to your ISP, your internet connection, or the sites that you're visiting.

  • Unexpected disk activity. A hacker/malware may be accessing files or programs on your computer. Again, this requires awareness of normal activity.

Note: When you are not actively using the computer or network, programs like the indexing service and backup utilities may be running in the background and accessing disks and the network.

The best advice is to follow common best-practices: regularly install updates, use a firewall, use current anti-malware software and be careful what you click on or download.

Facebook and social media

Your Facebook or social media account may compromised if posts appear on your Facebook wall or elsewhere that look like they are from you, but you did not submit them.

Note: Liking a page on Facebook, playing social media games, and sharing via social media can legitimately result in unintentional consequences. It is important to look for posts that could only have been submitted by you and yet you know that you didn't submit them.

If you believe any of your accounts have been compromised, change your password and recovery settings immediately.

How can I secure my workstation and mobile device?

In general, the following will help you better secure whatever system you have.
  • Keep up with system patches, and keep the operating system itself up to date! (Plan on rebuilding most systems once per year)
  • Stop all running services which you don't intend to use on the system.
  • When installing a system, limit network exposure until after you've patched and secured it.
  • Monitor the system logs daily/frequently, and log everything you can.
  • Use good passwords, the longer & more non-alphabetic the better. Change them often.
  • Use secure transport methods and encryption.

What information security scanning is performed?

Vulnerability scans of the entire McNeese State University address space are performed. Web application testing and vulnerability scans can also be performed upon request.