<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Email Safety &#8211; BC Knowledge for Students</title>
	<atom:link href="https://students.brooklyn.edu/article-categories/email-safety/feed/" rel="self" type="application/rss+xml" />
	<link>https://students.brooklyn.edu</link>
	<description>Search for answers to your questions</description>
	<lastBuildDate>Wed, 15 Apr 2026 19:53:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://students.brooklyn.edu/files/2022/03/cropped-favicon-3-32x32.png</url>
	<title>Email Safety &#8211; BC Knowledge for Students</title>
	<link>https://students.brooklyn.edu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Getting Started with Proofpoint Email Security</title>
		<link>https://students.brooklyn.edu/knowledge-base/getting-started-with-proofpoint-email-security/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Thu, 23 Jan 2025 16:26:50 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=12074</guid>

					<description><![CDATA[Proofpoint is an advanced email security system designed to protect you from spam, phishing, and other malicious email threats by scanning your incoming emails prior to delivering them to your mailbox. Suspicious emails are placed in quarantine folders for your review. How do I setup my Proofpoint account? You will...]]></description>
										<content:encoded><![CDATA[
<p>Proofpoint is an advanced email security system designed to protect you from spam, phishing, and other malicious email threats by scanning your incoming emails prior to delivering them to your mailbox. Suspicious emails are placed in quarantine folders for your review.</p>



<h3 class="wp-block-heading"><strong>How do I setup my Proofpoint account?</strong></h3>



<p>You will receive an email from the Proofpoint system with the subject <strong>Welcome to Proofpoint</strong>. The message will include a temporary password and a link to setup your account. Click the <strong>Manage My Account</strong> link then follow the steps to set your password.</p>



<p>Note: You don&#8217;t need to sign in to view quarantined messages if you click the message link directly in the digest message.</p>



<h3 class="wp-block-heading"><strong>How do I view the Proofpoint spam quarantine</strong>?</h3>



<p><strong>From your digest email</strong>: You will receive a daily <strong>End User Digest</strong> email with a list of all messages added to your quarantine each day. You can click the message directly to view within Proofpoint and take actions such as releasing, blocking, or allowing the sender going forward.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/image-3.png" alt="" class="wp-image-13019" style="width:341px;height:auto" /></figure>



<p><strong>From the web:</strong> You can view all the messages in your Proofpoint quarantine any time at <a href="https://00019a01.pphosted.com:10020/euweb/login&nbsp;">https://00019a01.pphosted.com:10020/euweb/login</a>.</p>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/image-2-1024x203.png" alt="" class="wp-image-13017" style="width:609px;height:auto" /></figure>



<h3 class="wp-block-heading"><strong>What are the different actions I can take on a quarantined message?</strong></h3>



<ul class="wp-block-list">
<li><strong>Release</strong>: release that specific message to your inbox.</li>



<li><strong>Block Sender</strong>: add the sender&#8217;s address to your personal &#8220;Blocked Senders List&#8221; to block future messages.</li>



<li><strong>Allow Sender</strong>: adds the sender&#8217;s address to your safelist so they are <strong>not blocked</strong> in the future. <em>You still need to release that specific message the first time to see it in your mailbox.</em></li>



<li><strong>Release and Allow Sender</strong>: performs both the <strong>Block Sender</strong> and <strong>Release Sender </strong>actions simultaneously.</li>
</ul>



<h3 class="wp-block-heading"><strong>What is the difference between the two Proofpoint quarantine folders?</strong></h3>



<ul class="wp-block-list">
<li><strong>Low Priority Mail &#8211; Quarantined</strong><br>The emails in this folder represent low priority email such as newsletters, invitations, and announcements placed in your personal quarantine.</li>



<li><strong>Spam &#8211; Quarantined</strong><br>The emails in this folder have been marked as spam. Review them carefully, and only release them or allow the sender if you are certain they are legitimate. Contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a> if you aren&#8217;t sure about a message.</li>
</ul>



<h3 class="wp-block-heading"><strong>How do I view and update the blocked and safe senders lists?</strong></h3>



<p>Select the <strong>Lists</strong> option in the left navigation then select either <strong>Safe Senders List</strong> or <strong>Blocked Senders List</strong> to review the senders in that list. You will have the option to edit or delete senders from either list when selected.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/Screenshot-2024-11-06-at-10.44.49 AM.jpg" alt="" class="wp-image-13075" style="width:420px;height:auto" /><figcaption class="wp-element-caption">Screenshot</figcaption></figure>



<h3 class="wp-block-heading">How long do messages remain in my quarantine?</h3>



<p>Messages remain in your quarantine for <strong>30 days</strong> before they are automatically deleted.</p>



<h3 class="wp-block-heading">What is the Proofpoint&#8217;s browser isolation mode?</h3>



<p>If you click a link in an email that Proofpoint considers a risk for spam or phishing, the link will open in a virtual browser (also referred to as a URL Isolation browser). This is a special secure browser that enables you to view the link without opening the page on your computer.</p>



<p>Once connected, Proofpoint will conduct a deep scan of the site (which takes up to 5 minutes). During that time, you may not be able to upload/download files. Once the  scan has completed, the <strong>Exit Isolation</strong> option will be displayed, allowing you to directly interact with the site.</p>



<h3 class="wp-block-heading">Have a question or need help accessing Proofpoint?</h3>



<p>Contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a> for assistance.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Proofpoint Email Security Guide</title>
		<link>https://students.brooklyn.edu/knowledge-base/proofpoint/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Thu, 07 Nov 2024 16:16:18 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=11131</guid>

					<description><![CDATA[Proofpoint is an advanced email security system designed to protect you from spam, phishing, and other malicious email threats by scanning your incoming emails prior to delivering them to your mailbox. Suspicious emails are placed in quarantine folders for your review. How do I setup my Proofpoint account? You will...]]></description>
										<content:encoded><![CDATA[
<p>Proofpoint is an advanced email security system designed to protect you from spam, phishing, and other malicious email threats by scanning your incoming emails prior to delivering them to your mailbox. Suspicious emails are placed in quarantine folders for your review.</p>



<h3 class="wp-block-heading"><strong>How do I setup my Proofpoint account?</strong></h3>



<p>You will receive an email from the Proofpoint system <em>(postmaster-pps@brooklyn.cuny.edu)</em> with the subject <strong>Welcome to Proofpoint</strong>. The message will include a temporary password and a link to setup your account. Click the <strong>Manage My Account</strong> link then follow the steps to set your password. </p>



<p>Note: You don&#8217;t need to sign in to view quarantined messages if you click the message link directly in the digest message.</p>



<h3 class="wp-block-heading"><strong>How do I view the Proofpoint spam quarantine</strong>?</h3>



<p><strong>From your digest email</strong>: You will receive a daily <strong>Proofpoint Digest</strong> email with a list of all messages added to your quarantine each day. You can click the message directly to view within Proofpoint and take actions such as releasing, blocking, or allowing the sender going forward.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/image-3.png" alt="" class="wp-image-13019" style="width:341px;height:auto" /></figure>



<figure class="wp-block-image size-large is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/image-2-1024x203.png" alt="" class="wp-image-13017" style="width:609px;height:auto" /></figure>



<h3 class="wp-block-heading"><strong>What are the different actions I can take on a quarantined message?</strong></h3>



<ul class="wp-block-list">
<li><strong>Release</strong>: release that specific message to your inbox.</li>



<li><strong>Block Sender</strong>: add the sender&#8217;s address to your personal &#8220;Blocked Senders List&#8221; to block future messages.</li>



<li><strong>Allow Sender</strong>: adds the sender&#8217;s address to your safelist so they are <strong>not blocked</strong> in the future. <em>You still need to release that specific message the first time to see it in your mailbox.</em></li>



<li><strong>Release and Allow Sender</strong>: performs both the <strong>Block Sender</strong> and <strong>Release Sender </strong>actions simultaneously.</li>
</ul>



<h3 class="wp-block-heading"><strong>What is the difference between the two Proofpoint quarantine folders?</strong></h3>



<ul class="wp-block-list">
<li><strong>Low Priority Mail &#8211; Quarantined</strong><br>The emails in this folder represent low priority email such as newsletters, invitations, and announcements placed in your personal quarantine.</li>



<li><strong>Spam &#8211; Quarantined</strong><br>The emails in this folder have been marked as spam. Review them carefully, and only release them or allow the sender if you are certain they are legitimate. Contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a> if you aren&#8217;t sure about a message.</li>
</ul>



<h3 class="wp-block-heading"><strong>How do I view and update the blocked and safe senders lists?</strong></h3>



<p>Select the <strong>Lists</strong> option in the left navigation then select either <strong>Safe Senders List</strong> or <strong>Blocked Senders List</strong> to review the senders in that list. You will have the option to edit or delete senders from either list when selected.</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" src="https://employees.brooklyn.edu/files/2024/11/Screenshot-2024-11-06-at-10.44.49 AM.jpg" alt="" class="wp-image-13075" style="width:420px;height:auto" /><figcaption class="wp-element-caption">Screenshot</figcaption></figure>



<h3 class="wp-block-heading">How long do messages remain in my quarantine?</h3>



<p>Messages remain in your quarantine for <strong>30 days</strong> before they are automatically deleted.</p>



<h3 class="wp-block-heading">What is the Proofpoint&#8217;s browser isolation mode?</h3>



<p>If you click a link in an email that Proofpoint considers a risk for spam or phishing, the link will open in a virtual browser (also referred to as a URL Isolation browser). This is a special secure browser that enables you to view the link without opening the page on your computer.</p>



<p>Once connected, Proofpoint will conduct a deep scan of the site (which takes up to 5 minutes). During that time, you may not be able to upload/download files. Once the  scan has completed, the <strong>Exit Isolation</strong> option will be displayed, allowing you to directly interact with the site.</p>



<h3 class="wp-block-heading">Have a question or need help accessing Proofpoint?</h3>



<p>Contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk </a>for assistance.</p>



<p class="wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-info"><strong>Learn more</strong> about <a href="https://students.brooklyn.edu/knowledge-base/e-mail-safety/">email safety</a> and protecting yourself against spam and phishing.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How do I report a suspicious email?</title>
		<link>https://students.brooklyn.edu/knowledge-base/how-do-i-report-a-suspicious-email/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 21:14:31 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=1597</guid>

					<description><![CDATA[If you aren&#8217;t sure if an email is legitimate or looks suspicious, forward the email tobc-infosec@brooklyn.cuny.edu. If you have questions, contact the IT Helpdesk. Review the email safety tips and phishing examples.]]></description>
										<content:encoded><![CDATA[
<p>If you aren&#8217;t sure if an email is legitimate or looks suspicious, forward the email to<br><strong>bc-infosec@brooklyn.cuny.edu</strong>. If you have questions, contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a>.</p>



<p>Review the <a href="https://students.brooklyn.edu/knowledge-base/e-mail-safety/" data-type="ht_kb" data-id="724">email safety tips</a> and <a href="https://students.brooklyn.edu/knowledge-base/how-can-i-spot-a-phishing-email/" data-type="ht_kb" data-id="1563">phishing examples</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CUNY Cybersecurity Awareness Training</title>
		<link>https://students.brooklyn.edu/knowledge-base/cuny-cybersecurity-awareness-training/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 15:14:15 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=1321</guid>

					<description><![CDATA[CUNY students can complete an interactive 25-minute Cybersecurity Awareness Training through Brightspace. You can access the training under the &#8220;Compliance&#8221; or tab. The training covers phishing, password protection, and data safety to protect personal and university information. More CUNY Cybersecurity awareness resources.]]></description>
										<content:encoded><![CDATA[
<p>CUNY students can complete an interactive 25-minute Cybersecurity Awareness Training through <a href="https://students.brooklyn.edu/knowledge-base/brightspace/" data-type="ht_kb" data-id="13868">Brightspace</a>. You can access the training under the &#8220;Compliance&#8221; or tab. </p>



<p>The training covers phishing, password protection, and data safety to protect personal and university information.</p>



<p>More CUNY <a href="https://www.cuny.edu/about/administration/offices/cis/information-security/security-awareness/">Cybersecurity awareness resources</a>.</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link wp-element-button" href="https://brightspace.cuny.edu/">Open Brightspace</a></div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>E-Mail Safety</title>
		<link>https://students.brooklyn.edu/knowledge-base/e-mail-safety/</link>
		
		<dc:creator><![CDATA[web]]></dc:creator>
		<pubDate>Tue, 02 Nov 2021 18:03:52 +0000</pubDate>
				<guid isPermaLink="false">https://students-knowall.blog.brooklyn.edu/?post_type=ht_kb&#038;p=724</guid>

					<description><![CDATA[Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else. To minimize your exposure to the damage that might come from malicious e-mail, take a...]]></description>
										<content:encoded><![CDATA[
<p>Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else.</p>



<p>To minimize your exposure to the damage that might come from malicious e-mail, take a few extra precautionary steps and investigate every incoming e-mail.</p>



<h3 class="wp-block-heading">Be Aware</h3>



<p>Phishing e-mails and text messages may look like they’re from a company you know or trust: a bank, a credit card company, a social networking site, an online payment website or app, or an online store. Phishing e-mails and text messages often tell a story to trick you into clicking on a link or opening an attachment. These days it is hard to avoid getting phishing e-mails.&nbsp;<strong>However, you can avoid becoming a victim!</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Do not respond to these e-mails, and never provide any personal information by e-mail. Do not click any links and do not open any attachments you weren’t expecting to receive. Do not forward these e-mails to your friends.</p>
</blockquote>



<p>Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else.</p>



<p>To minimize your exposure to the damage that might come from malicious e-mail, take a few extra precautionary steps and investigate every incoming e-mail.</p>



<p> <a href="https://students.brooklyn.edu/knowledge-base/how-can-i-spot-a-phishing-email/" data-type="ht_kb" data-id="1563">Learn more about Phishing emails</a>.</p>



<h3 class="wp-block-heading">For iPhone and iPad Users</h3>



<p>Tap on the e-mail to display the message, then tap on Details, and, finally, tap on the sender&#8217;s displayed name. Page displaying options for this sender will show as well as the sender&#8217;s e-mail address. To see where the links provided in the e-mail lead, tap and hold on any link until preview window appears.</p>



<h3 class="wp-block-heading">For Android Users</h3>



<p>Tap on the e-mail to display the message, then press the displayed name to reveal sender&#8217;s e-mail address. Regardless if the e-mail sender is legitimate or not, press the link to &#8220;Copy Address,&#8221; which will reveal the real URL.</p>



<h3 class="wp-block-heading">For Mac Users</h3>



<p>Hover the mouse on top of the sender&#8217;s e-mail to display options. Click on open outlook contact, which should look like an image of an ID card located on the right-hand side of the prompt. This should display the sender&#8217;s entire e-mail as well as other information such as organization and details. To see where the links provided in the e-mail go, hover you mouse over a link; this will reveal the real URL.</p>



<h3 class="wp-block-heading">For Windows Users</h3>



<p>Tap on the e-mail to display the message, then right click on the displayed name to open sender&#8217;s contact card. To see where the links provided in the e-mail go, hover mouse over to reveal the address.</p>



<p>Please remember, do not just click on any links provided in an e-mail. Mishandling fake e-mail could cost you thousands!</p>



<p>Also review the article on <a href="https://students.brooklyn.edu/knowledge-base/what-are-some-scam-employer-red-flags/" data-type="ht_kb" data-id="2069">employer job scams</a>.</p>



<h3 class="wp-block-heading">Need Help?</h3>



<p>If you receive an e-mail that worries you, report it to the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a>.</p>



<h3 class="wp-block-heading">I responded to phishing email, what should I do?</h3>



<p>If you sent money via Zelle to a phishing email, you should take the following steps immediately:</p>



<ol class="wp-block-list">
<li><strong>Contact Your Bank</strong> – Reach out to your bank or Zelle provider to report the fraudulent transaction and see if a reversal is possible.</li>



<li><strong>Report the Fraud to Zelle</strong> – Although Zelle transactions are typically irreversible, reporting the issue may help in certain cases.</li>



<li><strong>For an actual loss report</strong> to FBI at <strong>IC3.GOV</strong></li>



<li><strong>File a Fraud Report</strong> – Report the scam to the <strong>Federal Trade Commission (FTC) at reportfraud.ftc.gov</strong> and to <strong>your local law enforcement</strong> if needed.</li>



<li><strong>Monitor Your Accounts</strong> – Keep an eye on bank statements for any unauthorized transactions.</li>



<li><strong>Change Login Credentials</strong> – If you shared sensitive information, you should update passwords and enable two-factor authentication on their accounts.</li>



<li><strong>Report </strong>this incident to BC Campus Security<br>Telephone: 718.951.5511<br>E-mail:&nbsp;<a href="mailto:security@brooklyn.cuny.edu">security@brooklyn.cuny.edu</a></li>
</ol>



<ol start="1" class="wp-block-list">
<li></li>
</ol>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
