Report a Security Incident
A computer security incident is any attempted or successful unauthorized access, disclosure, or misuse of computing systems, data or networks, including hacking and theft.
REPORT A SECURITY INCIDENT
- Report anything unusual. If it sets off a warning in your mind, it just may be a problem. Don’t ignore it!
- Immediately report suspected security incidents and breaches to your supervisor and the ITS Support Center (see box to the right). Be sure to indicate whether sensitive information may be at risk.
- If you think your computer has been compromised, or someone might be accessing your computer remotely, it is best if you can unplug the network cable (and turn your wireless off, if you have it) and leave the computer on until help arrives.
Theft of Computing Equipment
Report suspected theft of UCSC-related computing equipment to the police in addition to notifying the ITS Support Center and your supervisor.
- On-campus theft: Contact the UCSC Police Department at 831-459-2231
- Off-campus theft: Contact local police
- Be sure to tell the ITS Support Center if the stolen equipment contains any sensitive information
- See the checklist for lost/stolen mobile devices below for additional details
- Immediately report lost or stolen devices to the police
- Report to UCSC police for campus incidents and local police for off-campus incidents (phone is best)
- Always get an incident or report number
- Call them back if item is found, including if a separate agency contacts you regarding a found device
- If you used the device for work
- Also report it to the ITS Support Center (info above) so they can help identify and address potential compromised accounts or data
- Notify your supervisor if it was a University-owned device
- For phones, notify your cellular carrier-- see if they can deactivate the device
- Change all passwords stored or used on the device, including email, Dropbox, banking, etc.
- Notify credit card companies and banks if you used the device for shopping or banking
- Try to track its location, if possible
- Try remote wipe if sensitive data or passwords were stored
Tips for protecting mobile devices: http://its.ucsc.edu/security/mobile.html
Also report spam and phishing directly to Google:
In addition to reporting spam and phishing email to ITS, please report it directly to Google. This helps put these emails on their radar as well. You must do this from your email on Google's website. If you don't normally access your email via the web, go to email.ucsc.edu and log in with your username and CruzID Blue password. When your mailbox loads, select the message you'd like to report.
- For spam, click on the spam button in the toolbar above your message list (the one that looks like a stop sign with an exclamation mark).
- To report phishing, please open the message and click on the little drop down arrow next to the reply button in the top right corner of the email and select "Report phishing" (you can also report spam this way). See Google's instructions at https://support.google.com/accounts/bin/answer.py?hl=en&answer=75061 for more details.
A computer security incident is any attempted or successful unauthorized access, disclosure, or misuse of computing systems, data or networks (including hacking and theft).
A computer security incident may involve any or all of the following:
- a violation of campus computer security policies and standards
- unauthorized computer access
- loss of information confidentiality
- loss of information availability
- computer/device theft
- compromise of information integrity
- a denial of service condition against data, network or computer
- misuse of service, systems or information
- physical or logical damage to systems
- lost or stolen equipment
- presence of a virus or spyware or any other malicious program
- sudden appearance of unexpected/unusual programs
- posting of confidential/restricted data to a publicly-accessible web site
- inadvertent sending of restricted data to unauthorized recipients
- establishment of an unauthorized account for a computer or application
- unusual network connections to a computer
- sharing/revealing passwords
- Prevent Identity Theft
- Identity Theft Resources
- Computer Virus Information
- Detecting a Breach
(information for system administrators)
Rev. April 2014