Skip to main content
Tulane Home Tulane Home


Tulane processes just under five million email messages every day accommodating approximately 70,000 personal and resource accounts. Technology Services dedicates significant resources to filter these messages for spam and phishing because we understand that phishing and spam are both annoying and potentially dangerous. We have to balance the task of blocking malicious email while not blocking legitimate traffic. Implementing much more restrictive filtering rules might result in blocking emails that Tulane customers need.

Tips To Not Get Phished

  • Never send your password in an email.
  • If it’s suspicious report it to
  • Hover over links with your mouse cursor to find suspicious links.
  • Watch for warning signs like EMERGENCY or URGENT that are meant to scare you into responding.
  • Tulane will never ask you for your password!

Visit this link to learn more about email security

Microsoft Filtering

Technology Services works closely with Microsoft to filter incoming messages. Read the Details Here:

When phishing and spam do get through, we notify Microsoft with the relevant information. Users can assist by sending any offending message along with header information to See this Knowledge Base article for instructions on how to locate the header information in an email message:

Compromised user accounts - Protect your account credentials

In many cases the phishing messages that are getting through to users are the result of a compromised Tulane account – a student, faculty or staff member unwittingly gives up his Tulane password to a scammer, who then uses that legitimate Tulane account to spam or phish other Tulane users. The scammer will change the user’s password, lock him/her out of the account, and send phishing messages to thousands of Tulane recipients in seconds.

Access to other systems

Once a scammer has your credentials, they also have access to other important systems such as Canvas, Gibson, Box and every other system that accepts a Tulane username and password.

More About Phishing

See the following Knowledge Base articles related to phishing and secure computing: