Skip to main content
Apply

Enterprise Information Technology

Open Main MenuClose Main Menu

Report incidents and suspicious activity

Use the links below to report incidents

Security Incident

Includes unauthorized access, system compromise, credential compromise, data breach, physical security breach and suspicious activity.

Phishing or Fraudulent Email

Meant to trick users into divulging private information. Includes extortion, suspicious, malicious and gift card emails. 

Spam Email 

Also known as junk mail, refers to unsolicited and irrelevant email messages, usually sent in bulk to a large list of recipients. Often used to trick or scam users. 

Suspicious Phone Call or Text Message

A form of phishing through unwanted calls or text messages. Used to steal money or personal information from users. 

Digital security tips for cyber safety

As cyber attacks happen everyday, it is important to stay informed about the latest threats and how to avoid them. Visit the page below to find helpful information that can help you stay cybersecure. 
Three girls sitting around a laptop
MENUCLOSE