Skip to main content
YOUR SOURCE FOR IMPROVING INFORMATION SECURITY FOR YOURSELF AND OUR CES COMMUNITY.

Report an Incident

Information security incidents are part of our current environment and can happen to anyone. If you believe an incident has or may have occurred:

  1. Don't try to address or solve the incident on your own.
  2. Immediately contact us at the CES Security Operations Center using the links below.
  3. Please report the incident to your management chain.
  4. Cooperate with any analysis or investigation that may follow.

If you need to report a suspicious email, follow the instructions on our phishing page.

Security Incident FAQs

  • An information security incident is defined as an attempted or successful unauthorized access, use, disclosure, modification, or destruction of information; interference with information technology operation; or violation of acceptable use policies. An IT security incident is any event that has or is likely to result in the compromise of the confidentiality, availability, or integrity of university information or a device that processes, stores, or transmits it. Examples of information security incidents include, but aren’t limited to:

    • Unauthorized attempts (failed or successful) to access, use, modify, disclose, or destroy information, information systems, architecture, and applications.
    • Loss or disclosure of sensitive university information. • Unauthorized access (or attempted access), use of or changes to system firmware, software or hardware.
    • Violation of acceptable use policies for university information or technology.
    • Interference with the operation or intended use of university information technology resources, including a denial of service attack.
    • Loss or theft of a university-owned device, or a personally-owned device that contains university data.
    • Unauthorized access to or exposure of sensitive information, such as Social Security numbers, whether accidental or intentional.
    • Unauthorized use of user credentials or impersonating another university user.
    • Your contacts are receiving emails that you did not send.
    • Changes have been made to account that you did not make.
    • A pop-up window instructs you to call a number for ‘help’ or to update your software.
    • Changes appear to your class schedule, personal information or financial aid that you did not initiate.
    • Unwanted browser toolbars appear, or web searches are redirected.
    • Friends receive social media invitations you didn’t send.
    • Your password doesn’t work.
    • Unfamiliar software is installed unexpectedly.

    Note: This list is not all inclusive

  • In any incidents of physical threats or theft of equipment, report the incident to the local police.

    If the incident involves a university device or a personal device storing sensitive university information, then notify your schools local service desk as well.

data-content-type=""
overrideBackgroundColorOrImage= overrideTextColor= overrideTextAlignment= overrideCardHideSection= overrideCardHideByline= overrideCardHideDescription= overridebuttonBgColor= overrideButtonText= overrideTextAlignment=