What is this service?
This service allows University of Central Oklahoma community members to report any suspicious activity, suspected account compromises, or instances of lost or stolen equipment. Whether it's a questionable email, unusual network behavior, compromised credentials, or missing devices, this service provides a streamlined channel to report and address potential security incidents promptly.
What are the benefits?
- Prompt resolution of security concerns: By reporting suspicious activity promptly, potential security threats can be identified and mitigated swiftly, minimizing potential damage.
- Enhanced security posture: Encouraging the reporting of security incidents helps strengthen the overall security posture of the university's digital and physical assets.
- Community involvement in security: Empowering university community members to report incidents fosters a security awareness and collaboration culture.
What is covered?
- Social Engineering Attacks: Reports of suspicious messages or phone calls attempting to deceive users into revealing sensitive information such as login credentials or personal data.
- Unauthorized Access Attempts: Incidents involving unauthorized attempts to access university systems, networks, or data repositories.
- Malware and Ransomware Infections: Notifications of malware infections, ransomware attacks, or other malicious software affecting university-owned devices or networks.
- Data Breaches: Reports of unauthorized access or disclosure of sensitive data, such as student records, research data, or financial information.
- Account Compromises: Suspected compromises of user accounts, including instances of password theft, credential stuffing attacks, or unauthorized access to university accounts.
- Lost or Stolen Devices: Reports of lost or stolen university-owned devices, such as laptops, tablets, or mobile phones, that may contain sensitive data.
- Policy Violations: Instances of users violating university IT security policies or guidelines, such as sharing passwords, accessing restricted resources, or engaging in unauthorized file sharing.
What is not covered?
- Phishing: The use of email to conduct social engineering attacks. Reporting is handled through integrated tools in the email clients offered to the UCO community.
- Technical support for non-security-related issues.
- Reporting of personal, non-university-related incidents.
How to request the service
- Online Support: Open a ticket through this self-service portal for prompt assistance
- Phone: Call the UCO Service Help Desk at 405-974-2255 and speak directly to a technician.
- Chat: Click Here to chat with a technician.
- Walk-in Support: Visit the IT Support Center on the first floor of the Chambers Library or the Tech Express on the second floor of the Nigh University Center for in-person troubleshooting and advice.
What happens next?
- The University's Information Security team will promptly investigate the incident upon receipt of the report.
- Depending on the nature of the report, additional information or clarification may be requested.
- Once the investigation is complete, appropriate actions will be taken to address the incident and prevent future occurrences.
Additional notes
- For urgent security incidents requiring immediate attention, please get in touch with the UCO Service Desk directly at 405-974-2255.
- Providing as much detail as possible when reporting incidents is essential to facilitate swift and accurate investigation and resolution.