Skip to content Skip to main navigation Report an accessibility issue
Information Security

Phishing Scam Simulation



Oops! You’ve Just Been Phished

hook in an envelop in red outline

Don’t worry—this was only a test. Phishing scams can be challenging to detect, and more people than you might imagine fall for them. Whether you feel frustrated for missing the clues or relieved that no harm was done, know that OIT is available to help you navigate any suspected phishing attempts.

This phishing simulation was conducted by the Office of Innovative Technologies (OIT) at the University of Tennessee, Knoxville, as part of our ongoing efforts to raise awareness about cybersecurity threats.

Important Reminder

support icon in orange outline

OIT will never ask you for your password, DUO two-factor authentication, or any personal information, via unsolicited email, text, or phone call.

Why This Simulation Matters

Important icon

If this had been a real phishing attempt, your account or computer could have been compromised. Fake phishing emails—like the one you received—are becoming increasingly common across campus. It’s essential to know how to identify them.

What You Can Do

Clipboard checklist icon in orange outline

Report Suspicious Emails: Use the Outlook “Report Message” button to flag malicious emails.
Phishing: Reporting Suspicious Messages and Best Practices

Educate Yourself: Review these helpful resources to better prepare for future phishing attempts:
Request a Consultation Regarding Security for a Product, Technology, Process, or Topic

Follow the guidelines for Antivirus Software.


We’re here to help if you have any questions or concerns about cybersecurity.
Please contact us at OIT_Security@utk.edu.