Phishing Schemes

Phishing schemes involve the use of deceptive messages designed to trick users into providing sensitive information, such as an Okey username and password. These messages often appear legitimate, and may resemble messages users typically see on a regular basis.
A common example of a phishing scheme involves an email that appears to be from IT. These emails often indicate a change has been made to the email system and users are required to provide their username and passwords. A link to an external website may or may not be provided for the user to respond.
Users who respond to these messages should attempt to change any provided information as quickly as possible. If you have provided your Okey username and password, try to login to Okey and change your password and challenge secret. If you are unable to login to Okey, contact the OSU IT Helpdesk at (405)744-4357.
What can I do to protect myself?
Users are encouraged to remain vigilant when asked to provide any sensitive information. Before providing any requested information, ensure you are providing it to a trusted party. If you are accessing a webpage that is requesting sensitive information, check the listed address (in the upper portion of the web browser) and ensure it appears valid.
If you have received an email that you feel may be related to a phishing scheme, you may report it to Emails reported to this address will need a copy of the original message, and a zipped copy of the original header information included as an attachment. If you need assistance obtaining these files, please refer to this support page provided by OSU IT Technology Support.