Report Information Security Incidents

Report actual or suspected IT security incidents as soon as possible so that work can begin to investigate and resolve them. If the incident poses any immediate danger, call 911 to contact law enforcement authorities immediately.

Reporting an IT Security Incident

If you suspect a potential security issue involving any private information—whether the information is on a computer, on paper, on the web, etc.—immediately report the details to IT by clicking the Report Incident button on this page. You should also alert your supervisor.  If you are unable to use this form, email incident@northcentral.edu

Be prepared to included:

  • Your contact information.
  • The department involved.
  • A brief description of what happened.
    • Do not include sensitive information in the initial report.  IT staff will contact you for more details.
  • A general description of the type of information at issue.

If the suspected breach is on a computer/device storing sensitive or private data, use another computer/device to report the incident.

Eligibility

Faculty, staff, and students can request this service.

 
Report Incident

Related Articles (9)

Spear phishing is a form of phishing that targets people. Request gift cards is a common tactic among spear phishers.
Learn what actions you should take to protect your accounts and report the incident.
Malware is an umbrella term for malicious software that is intentionally designed to cause damage to a device, disrupt service, or to gain unauthorized access to a device or to data.  Types of Malware include, but are not limited to,  computer viruses, worms, Trojan horses, ransomware, spyware, and adware.
Phishing attacks and other email scams take advantage of personal and professional relationships, organizational hierarchies, and human curiosities — information that is now readily available through social media and professional networking websites.
Ransomware is a type of malware that prevents or limits users from accessing their system and/or data by encrypting it.
Quick tips to secure your mobile device
Information about using physical media to store or share data.
What is an IT security incident? What type of impact can a security incident have on the university? How do I report an incident?
A compromised account is one accessed by a person not authorized to use the account.