Pause, Verify, Protect: Simple Steps to Spot and Avoid Scammers

Author: Lindsey Horner

Image of computer with one hand on it and one hand holding a cell phone

Scammers use social engineering as a technique to manipulate people into giving up confidential information. Scammers use various tactics (like phishing emails, texts and calls) to create a sense of urgency or fear, in the hopes of getting their target to act without thinking. It’s often effective because it preys on everyone’s natural tendency to trust and react quickly in tense moments.

The good news? You are your own best defense. By adopting some simple steps, you can drastically reduce your risk.

Pause: Take a Moment to Think
The moment a request feels urgent, highly emotional, or "too good to be true," just pause. Scammers rely on your immediate, emotional reaction, and they can’t do that if their target stops the interaction in its tracks.

  • Don't rush: Never feel pressured to act immediately. A legitimate organization or person will understand if you need a moment to check details.

  • Step away: If you receive an urgent call or email, tell the person you need to call them back, or close the email and return to it later.

Verify: Confirm the Story
Before clicking a link, opening an attachment, or sharing any information, verify the request using a trusted, independent method.

  • Do not use the contact information provided: If an email purports to be from your bank, do not call the number in the email. Instead, find the official phone number from their public website or a statement you already have.

  • Check the source: Hover your mouse over a link (without clicking!) to see the true destination URL. Scrutinize the sender's email address for subtle misspellings.

Protect: Keep Your Information Secure
If something feels wrong, trust your instincts and take action to protect yourself and the University.

  • Report it: Forward suspicious emails to phishing@nd.edu or report them right from your inbox.

  • Never share secrets: Never give out passwords, PINs, or MFA security codes to anyone, no matter who they claim to be. Legitimate organizations will never ask for this information.

By making Pause, Verify, Protect a habit, you can build a strong, personal defense against social engineering attacks. Want to learn more about other simple steps you can take for a safer campus, we have you covered!