{"id":15402,"date":"2025-08-25T15:38:44","date_gmt":"2025-08-25T20:38:44","guid":{"rendered":"https:\/\/uwm.edu\/information-technology\/?p=15402"},"modified":"2025-08-26T08:31:57","modified_gmt":"2025-08-26T13:31:57","slug":"account-deactivation-scam-2","status":"publish","type":"post","link":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/","title":{"rendered":"Account Deactivation Scam"},"content":{"rendered":"\n<p>Scammers like to target UWM students at the beginning of the semester. Currently, the most common type of scam at UWM is Account Deactivation Scams. These scams involve multiple steps to gain access to your UWM account. Here\u2019s what you can look out for:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li>You may receive an email saying it is the Help Desk, or Microsoft Support, and your account will be deactivated.<\/li>\n\n\n\n<li>The email has a link taking you to Google form where you enter your personal information, including your phone number.<\/li>\n\n\n\n<li>You receive a text message pretending to be the Help Desk or Microsoft Support asking for your authentication code (MFA).<\/li>\n\n\n\n<li>Your account is now compromised.<\/li>\n<\/ol>\n\n\n\n<p>Once the scam is complete, this cycle continues with scammers sending out more of these emails. This also leads to job scam emails being sent.<\/p>\n\n\n\n<p><strong>How to protect yourself:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you do not have a support request open, the UWM Help Desk will not contact you.<\/li>\n\n\n\n<li>UWM Help Desk and Microsoft will not text or call to ask for your multi-factor code (MFA).<\/li>\n\n\n\n<li>Do not fill out any unexpected forms that are sent to you.<\/li>\n\n\n\n<li>If you are unsure about an email, verify its legitimacy with the UWM Help Desk. You can also forward the email to <a href=\"mailto:abuse@uwm.edu\">abuse@uwm.edu<\/a>, and a member of our cybersecurity team will help you verify the email.<\/li>\n<\/ul>\n\n\n\n<p>If you believe you have been targeted by this type of scam, please contact the <a href=\"https:\/\/uwm.edu\/information-technology\/help\/\">UWM Help Desk<\/a>.<\/p>\n\n\n\n<p>For more information about phishing and scams, please <a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/phishing\/\">review our phishing webpage<\/a>.&nbsp;<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Scammers like to target UWM students at the beginning of the semester. Currently, the most common type of scam at UWM is Account Deactivation Scams. These scams involve multiple steps to gain access to your UWM account. Here\u2019s what you &hellip;<\/p>\n","protected":false},"author":19041,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","uwm_wg_additional_authors":[]},"categories":[8],"tags":[],"class_list":["post-15402","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Technology Resources<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Account Deactivation Scam\" \/>\n<meta property=\"og:description\" content=\"Scammers like to target UWM students at the beginning of the semester. Currently, the most common type of scam at UWM is Account Deactivation Scams. These scams involve multiple steps to gain access to your UWM account. Here\u2019s what you &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Technology Resources\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-25T20:38:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-26T13:31:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:site\" content=\"@UWM_IT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Account Deactivation Scam\",\"datePublished\":\"2025-08-25T20:38:44+00:00\",\"dateModified\":\"2025-08-26T13:31:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/\"},\"wordCount\":257,\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/\",\"name\":\"Account Deactivation Scam - Technology Resources\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\"},\"datePublished\":\"2025-08-25T20:38:44+00:00\",\"dateModified\":\"2025-08-26T13:31:57+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/account-deactivation-scam-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Account Deactivation Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/\",\"name\":\"Technology Resources\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/uwm.edu\\\/information-technology\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Technology Resources","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/","og_locale":"en_US","og_type":"article","og_title":"Account Deactivation Scam","og_description":"Scammers like to target UWM students at the beginning of the semester. Currently, the most common type of scam at UWM is Account Deactivation Scams. These scams involve multiple steps to gain access to your UWM account. Here\u2019s what you &hellip;","og_url":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/","og_site_name":"Technology Resources","article_published_time":"2025-08-25T20:38:44+00:00","article_modified_time":"2025-08-26T13:31:57+00:00","twitter_card":"summary_large_image","twitter_creator":"@UWM_IT","twitter_site":"@UWM_IT","twitter_misc":{"Written by":"","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/#article","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/"},"author":{"name":"","@id":""},"headline":"Account Deactivation Scam","datePublished":"2025-08-25T20:38:44+00:00","dateModified":"2025-08-26T13:31:57+00:00","mainEntityOfPage":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/"},"wordCount":257,"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/","url":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/","name":"Account Deactivation Scam - Technology Resources","isPartOf":{"@id":"https:\/\/uwm.edu\/information-technology\/#website"},"datePublished":"2025-08-25T20:38:44+00:00","dateModified":"2025-08-26T13:31:57+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/information-technology\/account-deactivation-scam-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/information-technology\/"},{"@type":"ListItem","position":2,"name":"Account Deactivation Scam"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/information-technology\/#website","url":"https:\/\/uwm.edu\/information-technology\/","name":"Technology Resources","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/information-technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"","url":"https:\/\/uwm.edu\/information-technology\/author\/"}]}},"acf":[],"meta_fields":{"_edit_lock":["1756215269:19041"],"_edit_last":["19041"],"_yoast_indexnow_last_ping":["1756215106"],"feat_img_video":[""],"feat_img_gallery":[""],"feat_img_caption":["feat-img-caption-on"],"breadcrumbs_display":["breadcrumbs-on"],"otp_nav_display":["otp-on-mobile"],"post_layout":["post-layout-theme"],"_yoast_wpseo_primary_category":["28"],"_yoast_wpseo_content_score":["90"],"_yoast_wpseo_inclusive_language_score":["90"],"_yoast_wpseo_focuskeywords":[""],"_yoast_wpseo_keywordsynonyms":[""],"_yoast_wpseo_estimated-reading-time-minutes":["2"],"_uwm_wg_content_review_log":["a:1:{i:0;a:5:{s:11:\"reviewer_id\";i:0;s:6:\"status\";s:5:\"reset\";s:10:\"entry_date\";s:19:\"2026-03-01 02:13:53\";s:16:\"priority_content\";s:0:\"\";s:4:\"note\";s:43:\"Content review reset at start of new cycle.\";}}"]},"publishpress_future_action":{"enabled":false,"date":"2026-04-24 03:29:25","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15402","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/users\/19041"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=15402"}],"version-history":[{"count":1,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15402\/revisions"}],"predecessor-version":[{"id":15403,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/posts\/15402\/revisions\/15403"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=15402"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=15402"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uwm.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=15402"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}