APPLY TO MESSIAH

Activate and Manage Your Messiah University Email

Activate and check your email

Check your Messiah University Email

Incoming students can expect to receive all official communication from the University through their Messiah email address, set up through Microsoft Outlook, and also known on-campus as Falcon Mail. To make sure you’re not missing anything important, activate your email address and check it regularly. If you have not yet activated your Messiah University login, review the activation instructions available on this page.

 

Activate and manage your Messiah University Email

  • Activate your Messiah University login to access to your email. Follow the instructions in the What's Next information on your Admissions Status Page, or on this website.
  • Check your Messiah University email regularly for important updates.
  • Review resources below about securing your account to protect you and your email.

Configure your Messiah University Email on your mobile device

Microsoft provides the Outlook smart device app for free – download your copy from your device’s app store. It is a robust mobile device app that we recommend. Set up the Outlook app on your mobile device (iPhone, iPad, Android Smart Phone, etc.)

However, should you prefer to use your device’s built-in mail client the links below will help get you started.

Secure and protect your email

Cybersecurity

As a Messiah University student it is your responsibility to play a role in keeping our campus safe from cyber threats. Cybersecurity includes how you access information, how you share it, and the methods you use (or do not use) to secure it. All students should:

  • Watch Messiah's How to avoid phishing scams video.
  • Use strong passwords over 10 characters long (spaces are allowed).
  • Refrain from reusing passwords.
  • Separate school and personal emails.
  • Do not open or respond to suspicious emails.
  • Follow ITS recommendations regarding connecting to the university network.
  • Be aware of what data you have access to, how you access it, and where you store it.

Avoid Phishing Scams

Phishing (pronounced: fishing) is an attack that attempts to steal money or your identity by getting you to reveal personal/company information -- such as credit card numbers, bank information, or passwords. Cyber criminals typically pretend to be reputable companies, friends, or acquaintances or use websites that pretend to be legitimate in fake messages. These messages may contain a link to a phishing website, or request your username and password.

How to Spot Malicious Emails

How do you know if an email is illegitimate, suspicious, or fraudulent? Review these common red flags:

  • Poor grammar
  • Unknown sender
  • Known sender name with an unknown email address
  • Use of emotion and/or urgency
  • A request for information, payment, or login credentials


How Should You Respond to Suspicious Emails?

If you receive an email that is suspicious in nature:

  • Do NOT open the email.
  • Do NOT click on any links or download any attachment.
  • Forward the email as an attachment to security@messiah.edu. ITS will let you know if the email is legitimate or not.
  • If the email is obviously “phishy,” please delete the email after forwarding it.
  • If you are unsure, keep the email in your inbox. ITS will let you know how to proceed.
  • If you need to know how to forward emails as attachments, we have instructions on the Tech Support Knowledge Base.

Stay Alert. Before responding to an email, ask yourself the following questions:

  • Do I know the sender?
  • Does the name match the email address of the sender?
  • Would/Should/Does the sender typically communicate this way?
  • Should I ask someone if this is legitimate prior to responding?
  • Do the links in the email correspond with the sender, the company, or the information/topic of the email?

If you click on a suspicious link in an e-mail and supplied your user ID and password, please contact ITS immediately by calling 717-796-4444 or e-mailing techsupport@messiah.edu for further instructions so we can be sure your account is safe