You are here

ITS Email Protection Strategies

University-wide email protection strategies

Overview

ITS has implemented a number of email protection strategies to protect the personal information of students, faculty and staff. See details below:

[External] Email Tagging

Phishing scams remain one of the top cybersecurity threats across the university. They can take the form of email scams by impersonating people we know. The majority of these types of scams start with a message originating from external email systems. As part of Temple's effort to reduce phishing and other email scams, all emails from external senders now include an [External] tag in the subject line.

No additional scanning, filtering or sorting of email is performed. If the message originates from a non-Temple University system then [External] is added to the beginning of the email subject line.

Please note that an [External] tag does not always mean that the message is unsafe or illegitimate. The purpose of the tag is to prompt the user to apply an appropriate level of scrutiny when reviewing the contents of the message in question.

In some cases, after a thorough review from ITS Information Security, messages from specific trusted external email systems may be excluded from the [External] tag. In these cases, you are still advised to proceed with caution.

A sample message showing the [External] tab appears below:

Sample email showing the [External] email tag

Sender Policy Framework (SPF)

Some emails with an @temple.edu email address actually originate from outside of Temple or from an internal application (other than Exchange, Gmail, Listserv or Xerox Printers).

If your department sends emails that fall under one or more of these conditions, the email must comply with Temple's Sender Policy Framework (SPF). Otherwise, they will not be delivered.

To learn more, see the Sender Policy Framework page.

Whitelisting

ITS uses spam filters to block suspicious emails from getting through to the university. In certain rare occasions, ITS allows for exceptions to this process by adding an email address to a whitelist.

To qualify for this exception, the request must undergo a thorough security review, showing that the sender is highly trusted and that the emails need immediately delivery. One such example, would be TUalerts.

Modern Authentication

On April 13, 2020, ITS disabled access to Temple email accounts via legacy (or basic) authentication protocols. This action was taken primarily for security reasons, but also in anticipation of similar controls to be implemented by both Microsoft and Google

The problem with legacy authentication is that it allows access to Temple mail systems via outdated protocols that bypass access controls, such as Single Sign On (SSO) and Multi Factor Authentication (MFA). Hackers can use these protocols, along with compromised credentials, to target email account holders with phishing attacks from within Temple's own email systems.

Although you can no longer can set up new connections to your Temple email account with email clients that do not support modern authentication (or OAuth2), previously established connections will continue to maintain access until ITS gradually migrates them to modern authentication.

If you are experiencing any issues accessing your email, please contact the Help Desk at tuhelp.temple.edu or by calling 215-204-8000.

Clients that support Modern Authentication or OAuth2
 
Mobile Devices

  • Gmail mobile app
  • Outlook mobile app
  • iOS Mail app
  • Android Mail app

Workstations

  • Outlook desktop client (version 2016 and above for Exchange)
  • Outlook desktop client (version 2019 update 1812 and above for Gmail)
  • MacOs Mail client

Web Access
tumail.temple.edu

Submit a Request

Departments request the following email services through the tuhelp.temple.edu website:

  • Disable the [EXTERNAL] tag for senders that should appear as internal to Temple
  • Register a vendor's fully qualified domain name or IP address as authorized to send on behalf of Temple per the Sender Policy Framework
  • Review an email address to be whitelisted to bypass the university spam filters