Examples of suspicious activity
- Unknown activity related to your account or computing services
- Log discrepancies
- Social engineering attempts
- Unfamiliar user accounts or files
- Unexpected system ports or processes
- Modification or deletion of data
- Changes in file or directory permissions
- Denial of service without obvious explanation
- Threats or harassment via email
If you suspect a security violation has occurred, contact your IT help desk right away. If confidential or sensitive data is associated with any computer involved in the incident, please call Information Security immediately at 940-369-7800 or contact us by email.
Refrain from accessing or further interacting with the computer in question. This will help preserve evidence integrity before the Information Security team can collect an image for forensic analysis.
Incident reporting steps
- Notify your IT help desk or IT support staff
- Notify your immediate supervisor
- Do not allow any changes to be made to the computer or related system.
Monday through Thursday from 8 a.m. to 9 p.m.
Fridays from 8 a.m. to 5 p.m.
Saturday and Sunday from 11 a.m. to 3 p.m.
If you wish to report criminal activity, contact your campus Police Department
Information to provide when reporting an incident
- Your name, phone number, email address, and department (if applicable)
- Contact information for anyone else directly involved, especially if someone else reported this incident to you
- Date, time, and location of incident
- Description of the incident, including as much technical detail as possible
- Any relevant documentation or logs
Last update: 7/26/21 @ 17:56 by Sanden