Report Incident
Content
Report promptly!
Report all IT security incidents or IT security emergencies to the Information Security Office at Fulda University of Applied Sciences. By email to it-security@hs-fulda.de or by telephone on 0661-9640-8877.
Your report should contain the following information:
- who is reporting (name, email address, telephone number)?
- when did the incident occur (date, time)?
- where did the incident take place (building, room)?
- type of incident (malware attack, system intrusion, …)?
- which system is affected (name, IP address)?
You can also download and print out our IT emergency card.
What is an IT security incident?
-
you have accidentally opened a suspicious attachment in an attachment in an email.
-
you have inadvertently clicked on a suspicious web address (link) in an email.
-
you receive an extortion email.
-
you receive an e-mail in which you are asked to personal data (user name, password, account number, …) via a web page or communicate them to someone.
-
you receive a large number of unsolicited messages in your mailbox (spam mail).
-
your user account is being misused to send spam mail.
-
your computer is behaving strangely (hard drive is running continuously, computer does not respond to inputs, …) because it may be infected with malware. is infected with malware.
-
you receive a phone call (usually the people pretend to be employees of a hotline of a certain company) company) because your computer allegedly has problems that can be solved with your can be solved with your help if you certain settings, which are now given to you by telephone. are now given to you by telephone.
-
you are called and asked about your working environment environment (products used, colleagues, colleagues, superiors, email addresses, …) so that this information can later be used for an attack computers and/or the university network (information computers and/or the university network (information gathering via social engineering).
-
you have committed an irregular use according to **Chapter 6 of the IT Security Policy of the university**.
-
if something seems strange or suspicious to you suspicious, it may also be an IT security incident. IT security incident.
**Report the incident promptly! All members of the university are obliged to report IT security incidents **.
What is an IT security emergency?
-
your end device has been stolen or you have lost it lost it.
-
your files are automatically deleted, modified or encrypted. **Try to limit the damage according to chapter 5 in the limit the damage according to chapter 5 in the basic protection document. requested to do so by the data centre.
-
your access data (user name/password, chip card, …) have been stolen. **Change your password immediately and/or have your user account blocked if necessary **.
-
you are being acutely blackmailed or threatened in order to compromise the to compromise the university’s IT infrastructure.
Who do I report what to?
Please contact the contact person of your organisational unit or the data centre if you detect an IT security incident or emergency, notice a violation of the IT security policy or report it yourself. breach of the IT security policy or if you yourself are the have been the victim of an attack by electronic means or you you have noticed incidents with criminal consequences. All IT security incidents and emergencies (with the exception of blackmail and threats) must also be reported to the affected the system administrator concerned, who is responsible for the who is responsible for the end device, lab computer, server or special software, the server or the specific software.