This website uses cookies to ensure site visitors get the best experience on our website. By continuing to use this site, you accept our use of cookies and Privacy Statement. To find out more, please visit Southern University's Privacy Statement.

I agree

Report an Incident

Reporting an Incident

 

Information or network security incidents should be reported immediately to: networksecurity@subr.edu

 
If an IT incident is suspected, it is important to act as soon as possible. While you may think an incident is "no big deal" or just a "simple mistake", it could have serious implications for the university departments or the university as a whole. The University also has specific legal responsibilities in response to a confirmed or suspected security incident. If the suspected incident involves a possibly compromised system, then the system should be disconnected from the University network. This will minimize the threat to other university systems.
 
Examples of security incidents include but are not limited to:
  • Excessive Bandwidth use caused by the compromise of a system
  • Commercial Use of IT resources
  • Compromised computers
  • Copyright Infringement
  • Digital Harassment
  • IP Spoofing
  • Intruder Activity
  • Network Attack / Denial of Service condition
  • Virus / Internet Worm Activity/ Spyware
 
When reporting a possible intrusion, it is helpful if you can provide us with the following information:
  • A description of the problem (what happened and when)
  • The computers that were affected (computer names and MAC and IP addresses)
  • The actions that have been taken to address this incident
  • Any other information or log files that you have (date and/or time of incident)
 

To report a security incident, send the following information to networksecurity@subr.edu:

  • Your full name

  • Your affiliation (Faculty, Staff, Student, etc...)

  • A phone number or campus e-mail address we can use to contact you (If you require a response)

  • The type of incident (Bandwith, Compromise, Copyright Infringement, etc...)

  • The IP name of the attacking system, if appropriate.