Text Size Default Text SizeDefault Text Size Large Text SizeLarge Text Size Largest Text SizeLargest Text Size Print Print this Page

Security Alerts & Information

Report a Security Incident

If you observe or suspect an IT security incident you should immediately report it.

What should I report?

Examples of IT security incidents that should be reported include:

  • Unauthorized access to a computer or account
    • Unauthorized attempts to access, i.e. Phishing emails
  • Compromises of University data
  • Use of a University IT resource for harassment, annoyance, intimidation, etc.
  • Violations of University IT policies

How should I report an incident?

Please note: For incidents involving threats to health or safety or the theft or vandalism of computers or computing devices, contact Campus Police at (434) 395-2091.

What information should I provide?

Include a complete description of what you have observed or why you suspect an incident.

Also provide:

  • Your contact information (name, phone number, e-mail address, department)
  • Time and location of the incident
  • If your report involves email, forward the message as an attachment (Ctrl + Alt + F) so that the headers and routing information stays intact.
  • If your report involves a web page, include the complete URL (web address) and describe the problem.

Learn More


The Security Minute

Take a Second to Be Secure

Security Minute Logo

The Information Security Office publishes a monthly newsletter designed to raise awareness of information security related issues and concerns.  If you have any questions regarding the newsletter, please contact Jennifer Patterson at 434-395-2034 or pattersonjl2@longwood.edu.

We are currently working on updating our Newsletter.  Stay tuned.


VPN Information

Longwood University offers two types of remote access VPNs - a web-based VPN for use from any computer and a client-based VPN for University owned computers. Learn more


Web Form Hosting & Phishing

Longwood University has an email processing rule that can detect URL's from these web form hosting services but cannot detect whether the suspected URL goes to a form that collects personal information or a legitimate use of the web form hosting service. 

Read More about Web Form Hosting & Phishing