Information Security - PhishStick Security Analyst

Informational
Overview

Our Information Security team has deployed a Security Analyst tool as part of our AI Phishing Coach: PhishStick.  PhishStick will assist with protecting our RPI Community from advanced email-based Phishing attacks.  

For emails that are reported to Microsoft through Outlook, PhishStick will investigate and confirm if the email is safe or will automatically remediate emails that are confirmed Phishing.  Please see below how to report a message as Phishing, and features of PhishStick. 

Note: PhishStick will NOT review all email; Only email reported as Phishing

How to Report a Message as Phishing

Outlook Desktop Application

  1.  Click the Report Message button from the Outlook ribbon on the Desktop App.
  2. Click Junk or Phishing, and a message will appear on the screen asking if you would like to report this message.  

Outlook - Web App (OWA)

  1. With the message opened, click the drop down arrow to the right of the Report icon located on the top left side of the Outlook bar.
  2. Choose Report Phishing or Report Junk, and a message appears to click ok to report this message.
Email is received by PhishStick
  • PhishStick will complete a triage to autonomously inspect and evaluate Client reported emails and categorize as being:
    • Phishing/Malicious
    • Spam
    • Safe
    • Phishing Simulation 
  • PhishStick will then send a response to our Client from Security@rpi.edu, providing a detailed explanation of the judgement of the email based on one of the above categories.  
  • For emails that are confirmed Phishing, PhishStick will automatically investigate and remove the malicious email that may have been delivered to other RCSUserID@rpi.edu mailboxes. 
  • Once receiving a response from PhishStick: If Client's have any other IT Security questions or concerns, please click Reply, and ask any questions such as:
    • Why was this email marked as spam/malicious?
    • Is this email safe to click or reply?
    • I accidently clicked this suspicious email, what should I do?
    • What is Business Email Compromise (BEC), and how do I spot it?
  • If PhishStick is unable to answer your question, your request will be forwarded to our Information Security team. 

Thank you,

Matthew Lewis

Information Security Analyst

 Book time to meet with Information Security

A person in a blue shirt and tie

AI-generated content may be incorrect.

Back to top