CyberSecurity Support

What is this service?

This service allows University of Central Oklahoma community members to report any suspicious activity, suspected account compromises, or instances of lost or stolen equipment. Whether it's a questionable email, unusual network behavior, compromised credentials, or missing devices, this service provides a streamlined channel to report and address potential security incidents promptly.

What are the benefits?

  • Prompt resolution of security concerns: By reporting suspicious activity promptly, potential security threats can be identified and mitigated swiftly, minimizing potential damage.
  • Enhanced security posture: Encouraging the reporting of security incidents helps strengthen the overall security posture of the university's digital and physical assets.
  • Community involvement in security: Empowering university community members to report incidents fosters a security awareness and collaboration culture.

What is covered?

  • Social Engineering Attacks: Reports of suspicious messages or phone calls attempting to deceive users into revealing sensitive information such as login credentials or personal data.
  • Unauthorized Access Attempts: Incidents involving unauthorized attempts to access university systems, networks, or data repositories.
  • Malware and Ransomware Infections: Notifications of malware infections, ransomware attacks, or other malicious software affecting university-owned devices or networks.
  • Data Breaches: Reports of unauthorized access or disclosure of sensitive data, such as student records, research data, or financial information.
  • Account Compromises: Suspected compromises of user accounts, including instances of password theft, credential stuffing attacks, or unauthorized access to university accounts.
  • Lost or Stolen Devices: Reports of lost or stolen university-owned devices, such as laptops, tablets, or mobile phones, that may contain sensitive data.
  • Policy Violations: Instances of users violating university IT security policies or guidelines, such as sharing passwords, accessing restricted resources, or engaging in unauthorized file sharing.

What is not covered?

  • Phishing: The use of email to conduct social engineering attacks. Reporting is handled through integrated tools in the email clients offered to the UCO community.
  • Technical support for non-security-related issues.
  • Reporting of personal, non-university-related incidents.

How to request the service

  • Online Support: Open a ticket through this self-service portal for prompt assistance 
  • Phone: Call the UCO Service Help Desk at 405-974-2255 and speak directly to a technician.
  • Chat: Click Here to chat with a technician. 
  • Walk-in Support: Visit the IT Support Center on the first floor of the Chambers Library or the Tech Express on the second floor of the Nigh University Center for in-person troubleshooting and advice.

What happens next?

  1. The University's Information Security team will promptly investigate the incident upon receipt of the report.
  2. Depending on the nature of the report, additional information or clarification may be requested.
  3. Once the investigation is complete, appropriate actions will be taken to address the incident and prevent future occurrences.

Additional notes

  • For urgent security incidents requiring immediate attention, please get in touch with the UCO Service Desk directly at 405-974-2255.
  • Providing as much detail as possible when reporting incidents is essential to facilitate swift and accurate investigation and resolution.