Reporting an IT Security Incident
What You Need To Do To Get Help
If you learn of any of the following:
- potential unauthorized disclosure or alteration of sensitive data
- loss or theft of devices or media containing sensitive data
- university web page displaying inappropriate content
- distribution of malicious software on NC State computers
then be sure to email email@example.com or call (919) 515-4357.
Your report should include all of the following:
- type of incident
- your name and contact information
- date and time of the incident
- IP address of each computer involved
- logs from each computer involved.
Securing The Human
Help protect yourself and NC State by learning good habits and best practices for IT security.
Remember that you and only you are ultimately responsible for all the usage of your computer and computing account. Protect yourself and protect NC State by understanding and following safe computing guidelines.
See NC State’s Antivirus Software Requirements.
Data Sensitivity Framework
How sensitive is your data?
What do you need to do to protect it?
The Data Sensitivity Framework enables users of university data both to assess its sensitivity level and to secure it accordingly from risks, which may include, but are not limited to, unauthorized destruction, modification, disclosure, access, use and removal.
Mobile Device Security
If you have access to any university data (including email) via your personal or university-owned mobile device, take action to protect sensitive data in the event the device becomes compromised, lost or stolen.
Information Security Framework
Read about the information security standards followed by NC State.
OIT has provided a framework for the passwords and account types that are used in the authentication process for university-wide applications.
Campus Procedures & Resources
Electronic Media Disposal
Are you thinking about throwing away university-owned hard drives, tapes or other storage media devices?
Wait! Those devices could have sensitive university data on them. Follow these instructions for secure disposal.
System Access Removal Checklist
Supervisors of separating employees should follow these instructions in conjunction with HR’s Employee Separation Clearance Checklist.
Generate an SSL certificate for your NC State-hosted website or web application.
Tools and resources for campus IT.
Peer-to-Peer (P2P) File Sharing
Illegal file sharing of copyrighted material via peer-to-peer (P2P) applications or other means is a serious offense. It can lead to university disciplinary actions as well as criminal and civil penalties.
System Access Request
Request access to secure applications, such as HR, FIN and SIS.