Security Alerts & Information
Report a Security Incident
If you observe or suspect an IT security incident you should immediately report it.
What should I report?
Examples of IT security incidents that should be reported include:
- Unauthorized access to a computer or account
- Unauthorized attempts to access, i.e. Phishing emails
- Compromises of University data
- Use of a University IT resource for harassment, annoyance, intimidation, etc.
- Violations of University IT policies
How should I report an incident?
- Send an e-mail to email@example.com
- Call User Support Services at (434) 395-4357 or email firstname.lastname@example.org
Please note: For incidents involving threats to health or safety or the theft or vandalism of computers or computing devices, contact Campus Police at (434) 395-2091.
What information should I provide?
Include a complete description of what you have observed or why you suspect an incident.
- Your contact information (name, phone number, e-mail address, department)
- Time and location of the incident
- If your report involves email, forward the message as an attachment (Ctrl + Alt + F) so that the headers and routing information stays intact.
- If your report involves a web page, include the complete URL (web address) and describe the problem.
The Security Minute
Take a Second to Be Secure
The Information Security Office publishes a monthly newsletter designed to raise awareness of information security related issues and concerns. If you have any questions regarding the newsletter, please contact Jennifer Patterson at 434-395-2034 or email@example.com.
We are currently working on updating our Newsletter. Stay tuned.
Longwood University offers two types of remote access VPNs - a web-based VPN for use from any computer and a client-based VPN for University owned computers. Learn more
Web Form Hosting & Phishing
Longwood University has an email processing rule that can detect URL's from these web form hosting services but cannot detect whether the suspected URL goes to a form that collects personal information or a legitimate use of the web form hosting service.
Read More about Web Form Hosting & Phishing
The Information Security Office is constantly monitoring for malicious activity and adjusting filters to catch the obvious, but we can’t block or filter them all. Since phishing is considered one of the biggest security threats to any organization, help Shield Longwood when checking your email by slowing down (check the address and greeting, look for mistakes, and hover on that link) and using your phishy sense (*required* urgency is usually bad and friends/family/colleagues can be victims too). Lastly, when in doubt, ask I.T.
Learn More about Phishing Indicators