Text Size Default Text SizeDefault Text Size Large Text SizeLarge Text Size Largest Text SizeLargest Text Size Print Print this Page

Security Alerts & Information

Report a Security Incident

If you observe or suspect an IT security incident you should immediately report it.

What should I report?

Examples of IT security incidents that should be reported include:

  • Unauthorized access to a computer or account
    • Unauthorized attempts to access, i.e. Phishing emails
  • Compromises of University data
  • Use of a University IT resource for harassment, annoyance, intimidation, etc.
  • Violations of University IT policies

How should I report an incident?

Please note: For incidents involving threats to health or safety or the theft or vandalism of computers or computing devices, contact Campus Police at (434) 395-2091.

What information should I provide?

Include a complete description of what you have observed or why you suspect an incident.

Also provide:

  • Your contact information (name, phone number, e-mail address, department)
  • Time and location of the incident
  • If your report involves email, forward the message as an attachment (Ctrl + Alt + F) so that the headers and routing information stays intact.
  • If your report involves a web page, include the complete URL (web address) and describe the problem.

Learn More

 
 

The Security Minute

Take a Second to Be Secure

Security Minute Logo

The Information Security Office publishes a monthly newsletter designed to raise awareness of information security related issues and concerns.  If you have any questions regarding the newsletter, please contact Jennifer Patterson at 434-395-2034 or pattersonjl2@longwood.edu.

We are currently working on updating our Newsletter.  Stay tuned.

 

VPN Information

Longwood University offers two types of remote access VPNs - a web-based VPN for use from any computer and a client-based VPN for University owned computers. Learn more

 

Web Form Hosting & Phishing

Longwood University has an email processing rule that can detect URL's from these web form hosting services but cannot detect whether the suspected URL goes to a form that collects personal information or a legitimate use of the web form hosting service. 

Read More about Web Form Hosting & Phishing

Phishing Indicators

The Information Security Office is constantly monitoring for malicious activity and adjusting filters to catch the obvious, but we can’t block or filter them all. Since phishing is considered one of the biggest security threats to any organization, help Shield Longwood when checking your email by slowing down (check the address and greeting, look for mistakes, and hover on that link) and using your phishy sense (*required* urgency is usually bad and friends/family/colleagues can be victims too). Lastly, when in doubt, ask I.T.

Learn More about Phishing Indicators