Pack Data in Danger?

Report a Cybersecurity Incident

What Are Cybersecurity Incidents?

  • Potential unauthorized disclosure or alteration of sensitive data
  • Loss or theft of devices or media containing sensitive data
  • University web page displaying inappropriate content
  • Distribution of malicious software on NC State computers

How to Report an Incident

To report a cybersecurity incident, send email to abuse@ncsu.edu or call 919.515.4357 (HELP).

Include as much of the following information as possible:

  • Type of incident
  • Your name and contact information
  • Date and time of incident
  • IP address of each computer involved
  • Logs from each computer involved

Securing the Human

Help protect yourself and NC State by learning good habits and best practices for IT security.

Safe Computing

Remember that you and only you are ultimately responsible for all the usage of your computer and computing account. Protect yourself and NC State by understanding and following safe computing guidelines.

Data Security

Endpoint Protection Standard

The RUL 08.00.18 – Endpoint Protection Standard (EPS) prescribes minimum requirements for every device, computer, and information system connected to the NC State network including university-owned and personally owned devices.

For additional information, please visit the Endpoint Protection Standard Implementation page.

Data Sensitivity Framework

How sensitive is your data and what do you need to do to protect it?

These are great questions and you can answer them easily using the Data Sensitivity Framework.  Click the following link to assess the sensitivity level of your data and to secure it accordingly from risks, which may include but are not limited to unauthorized data destruction, modification, disclosure, access, use, and removal.

Mobile Device Security

If you have access to any university data (including email) via your personal or university-owned mobile device, take action to protect sensitive data in the event the device becomes compromised, lost or stolen.

Information Security Framework

Read about the information security standards followed by NC State.

Password Standard

OIT has provided a framework for the passwords and account types that are used in the authentication process for university-wide applications.

Two-Factor Authentication (2FA)

NC State provides Google 2-Step and Duo as its primary multifactor authentication solutions to protect most vital campus resources.

Campus Procedures & Resources

Electronic Media Disposal

Are you thinking about throwing away university-owned hard drives, tapes or other storage media devices?

Wait! Those devices could have sensitive university data on them. Follow these instructions for secure disposal.

System Access Removal Checklist

Supervisors of separating employees should follow these instructions in conjunction with HR’s Employee Separation Clearance Checklist.

SSL Certificates

Generate an SSL certificate for your NC State-hosted website or web application.

Security Resources

Tools and resources for campus IT.

Peer-to-Peer (P2P) File Sharing

Illegal file sharing of copyrighted material via peer-to-peer (P2P) applications or other means is a serious offense. It can lead to university disciplinary actions as well as criminal and civil penalties.

System Access Request

Request access to secure applications, such as HR, FIN and SIS.