- Main Navigation
- Policies, Procedures, and Handbooks
- Services
- After School Activities
- External Providers
- Laptop Program
- Printing
- Adding Printer Credit
- Change Default Paper Size on Mac
- Double Sided Printing
- Fuji Xerox Login
- Fuji Xerox printing tips and tricks on Mac
- Print from Print Station in Library
- Printer Authentication
- Printer Setup
- Printer setup for MS Art
- Printing Flipbooks from Google Slides
- Printing Guidelines
- Printing Costs and Quotas
- Reset Printer Authentication
- Booklet Printing
- Technology Support
- User Accounts
- Tips and Guides
- Laptops
- Applications
- Athletics
- Calendars
- Clever Sign In
- CTP Testing
- Departing Students
- Download Seesaw Archive - Student
- Equipment Check out
- General
- MacBook
- Recording a QuickTime Video
- Recording a Screencast
- Software Installs
- Student Tech Setup
- Technology Management Tips for Parents
- Technology Repairs
- Split Screen iPad
- Youtube - Age restriction
- Tools
- Google Apps
- Accounts - User Profile - People
- Archive and Organize Google
- Activate Google Apps
- Gmail Forwarding
- Google Graduation
- Google Mail
- Google Meet: Overview
- Google Search Techniques
- Google Takeout
- Mailto Links in Gmail
- Hardware Acceleration
- Video Conferencing
- Video Conferencing Student Guidelines
- Video Conference - Avoid these mistakes
- Google Tutorials
- 2-Step Verification 2FA
- SSIS Health App
- PowerSchool
- SchoolsBuddy
- Schoology
- Seesaw
- Online Tools Overview
- Zoom
- Google Apps
- SSIS Brand Kit 2023
- Main Navigation »
- Tips and Guides »
- General »
- Phishing Scam - How to Detect
A phishing scam is a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
They can be difficult to detect and first glance, so important to notice the signs of scam. Below is a screenshot of a phishing scam, pointing out the elements to help you detect it's fraudulent nature. You can check for these same elements in any suspect email.