Reporting an IT Security Incident
What You Need To Do
If you learn of any of the following:
- Potential unauthorized disclosure or alteration of sensitive data
- Loss or theft of devices or media containing sensitive data
- University web page displaying inappropriate content
- Distribution of malicious software on NC State computers
…email email@example.com or call 919.515.4357.
Be sure to include all of the following in your report:
- Type of incident
- Your name and contact information
- Date and time of the incident
- IP address of each computer involved
- Logs from each computer involved
Securing The Human
Help protect yourself and NC State by learning good habits and best practices for IT security.
Remember that you and only you are ultimately responsible for all the usage of your computer and computing account. Protect yourself and protect NC State by understanding and following safe computing guidelines.
See NC State’s Antivirus Software Requirements.
Endpoint Protection Standard
The RUL 08.00.18 – Endpoint Protection Standard (EPS) prescribes minimum requirements for every device, computer, and information system connected to the NC State network including university-owned and personally owned devices.
For additional information, please visit the Endpoint Protection Standard Implementation page.
Data Sensitivity Framework
How sensitive is your data and what do you need to do to protect it?
These are great questions and you can answer them easily using the Data Sensitivity Framework. Click the following link to assess the sensitivity level of your data and to secure it accordingly from risks, which may include but are not limited to unauthorized data destruction, modification, disclosure, access, use, and removal.
Mobile Device Security
If you have access to any university data (including email) via your personal or university-owned mobile device, take action to protect sensitive data in the event the device becomes compromised, lost or stolen.
Information Security Framework
Read about the information security standards followed by NC State.
OIT has provided a framework for the passwords and account types that are used in the authentication process for university-wide applications.
Two-Factor Authentication (2FA)
NC State provides Google 2-Step and Duo as its primary multifactor authentication solutions to protect most vital campus resources.
Campus Procedures & Resources
Electronic Media Disposal
Are you thinking about throwing away university-owned hard drives, tapes or other storage media devices?
Wait! Those devices could have sensitive university data on them. Follow these instructions for secure disposal.
System Access Removal Checklist
Supervisors of separating employees should follow these instructions in conjunction with HR’s Employee Separation Clearance Checklist.
Generate an SSL certificate for your NC State-hosted website or web application.
Tools and resources for campus IT.
Peer-to-Peer (P2P) File Sharing
Illegal file sharing of copyrighted material via peer-to-peer (P2P) applications or other means is a serious offense. It can lead to university disciplinary actions as well as criminal and civil penalties.
System Access Request
Request access to secure applications, such as HR, FIN and SIS.