Skip to Page Content
UCCS
:
Home
•
Calendar
•
Map
It Security
Anti-Virus and Anti-Spyware
Campus and General Resources
File Sharing (P2P) and Copyrights
Awarness / Education
Policies
Data Discovery, Classification and Clean-Up
Resources
Reporting Incidents and Incident Response
Contacts
Home Computing and Student Resources
Cyber Awareness
Cyber Security and Safety Tips
Phishing
Spam and Scams
Virus and Malware
Social Networking
Privacy and Identity Theft
Monthly Newsletter
March 2013 IT Security and Help Desk Newsletter
February 2013 IT Security and Help Desk Newsletter
December 2012 IT Security and Help Desk Newsletter
November 2012 IT Security and Help Desk Newsletter
October 2012 IT Security and Help Desk Newsletter
September 2012 IT Security and Help Desk Newsletter
August 2012 IT Security and Help Desk Newsletter
July 2012 IT Security and Help Desk Newsletter
June 2012 IT Security and Help Desk Newsletter
May 2012 IT Security and Help Desk Newsletter
April 2012 IT Security and Help Desk Newsletter
March 2012 IT Security and Help Desk Newsletter
February 2012 IT Security and Help Desk Newsletter
January 2012 IT Security and Help Desk Newsletter
December 2011 IT Security and Help Desk Newsletter
November 2011 IT Security and Help Desk Newsletter
October 2011 IT Security and Help Desk Newsletter
September 2011 IT Security and Help Desk Newsletter
Reporting Incidents and Incident Response
If you suspect a computer security incident, please contact:
UCCS IT Security Principal
Greg Williams
719-255-3211 office
719-237-6491 cell
itsecure@uccs.edu
Some signs that may mean you’ve been compromised:
Pop-ups or warnings from Symantec Endpoint (even if they seem insignificant)
Computer is on when you are sure you turned it off
Unexpected user’s name is shown on login page
Files or folders are changed, missing, or appear without your knowledge
Cursor moves around without you touching the mouse
Password suddenly no longer works but did not expire
What to do:
Leave the computer running
Disconnect computer from network by removing the Ethernet cable from wall port or from back of computer
Do not call the IT help desk; call one of numbers above, or send an email to
itsecure@uccs.edu
Give as much of the following information as possible:
Person who detected the incident
Date and time detected
System/service involved
Location (bldg/room) of system/service
Department responsible for the system/service
Type and scope of data compromised (if known)
Brief description of the event (or of the weakness exploited)
Guidelines for Reporting:
UCCS Incident Reporting Guidelines
UCCS Incident Response Plan can be found here:
UCCS Computer Security Incident Response Plan