Reporting an IT Security Incident

What You Need To Do To Get Help

If you learn of any of the following:

  • potential unauthorized disclosure or alteration of sensitive data
  • loss or theft of devices or media containing sensitive data
  • university web page displaying inappropriate content
  • distribution of malicious software on NC State computers

then be sure to email or call 919.515.4357.

Your report should include all of the following:

  • type of incident
  • your name and contact information
  • date and time of the incident
  • IP address of each computer involved
  • logs from each computer involved.

Securing The Human

Help protect yourself and NC State by learning good habits and best practices for IT security.

Safe Computing

Remember that you and only you are ultimately responsible for all the usage of your computer and computing account. Protect yourself and protect NC State by understanding and following safe computing guidelines.

Data Security

Data Sensitivity Framework

How sensitive is your data?
What do you need to do to protect it?

The Data Sensitivity Framework enables users of university data both to assess its sensitivity level and to secure it accordingly from risks, which may include, but are not limited to, unauthorized destruction, modification, disclosure, access, use and removal.

Mobile Device Security

If you have access to any university data (including email) via your personal or university-owned mobile device, take action to protect sensitive data in the event the device becomes compromised, lost or stolen.

Information Security Framework

Read about the information security standards followed by NC State.

Password Standard

OIT has provided a framework for the passwords and account types that are used in the authentication process for university-wide applications.

Campus Procedures & Resources

Electronic Media Disposal

Are you thinking about throwing away university-owned hard drives, tapes or other storage media devices?

Wait! Those devices could have sensitive university data on them. Follow these instructions for secure disposal.

System Access Removal Checklist

Supervisors of separating employees should follow these instructions in conjunction with HR’s Employee Separation Clearance Checklist.

SSL Certificates

Generate an SSL certificate for your NC State-hosted website or web application.

Security Resources

Tools and resources for campus IT.

Peer-to-Peer (P2P) File Sharing

Illegal file sharing of copyrighted material via peer-to-peer (P2P) applications or other means is a serious offense. It can lead to university disciplinary actions as well as criminal and civil penalties.

System Access Request

Request access to secure applications, such as HR, FIN and SIS.