Text Size Print
Security Alerts & Information
Report a Security Incident
If you observe or suspect an IT security incident you should immediately report it.
What should I report?
Examples of IT security incidents that should be reported include:
- Unauthorized access to a computer or account
- Unauthorized attempts to access, i.e. Phishing emails
- Compromises of University data
- Use of a University IT resource for harassment, annoyance, intimidation, etc.
- Violations of University IT policies
How should I report an incident?
- Send an e-mail to email@example.com
- Call User Support Services at (434) 395-4357 or email firstname.lastname@example.org
Please note: For incidents involving threats to health or safety or the theft or vandalism of computers or computing devices, contact Campus Police at (434) 395-2091.
What information should I provide?
Include a complete description of what you have observed or why you suspect an incident.
- Your contact information (name, phone number, e-mail address, department)
- Time and location of the incident
- If your report involves email, forward the message as an attachment (Ctrl + Alt + F) so that the headers and routing information stays intact.
- If your report involves a web page, include the complete URL (web address) and describe the problem.
The Security Minute
Take a Second to Be Secure
The Information Security Office publishes a monthly newsletter designed to raise awareness of information security related issues and concerns. If you have any questions regarding the newsletter, please contact Jen Eckrote at 434-395-2034 or email@example.com.
We are currently working on updating our Newsletter. Stay tuned.
Longwood University offers two types of remote access VPNs - a web-based VPN for use from any computer and a client-based VPN for University owned computers. Learn more
Web Form Hosting & Phishing
Longwood University has an email processing rule that can detect URL's from these web form hosting services but cannot detect whether the suspected URL goes to a form that collects personal information or a legitimate use of the web form hosting service.
Read More about Web Form Hosting & Phishing