Browse commonly used Information Security and IT Compliance (ISIC) tools and services below. The ISIC team provides several services to keep your information and the university's data safe. Services provided include monitoring, protecting and securing our information technology infrastructure, data and operations to safeguard the privacy of the university community while maintaining compliance with applicable policies, laws and regulations.
For information technology services, visit our Information Strategy and Services partner at the Office of Information Technology (OIT) website or contact the Service Desk for additional questions.
If you believe your account is compromised, contact the OIT Service Desk immediately for assistance and do not turn off your computer.
You will need to report the security event to our Information Security and IT Compliance (ISIC) team for investigation. To report an incident, log into the OIT Service Center in the upper right corner. Once logged in with your university credentials, select "Make a Request." Scroll down and choose "Security Event" from the tile options. From there, several options will appear. Select the one that best matches the situation. For a compromised email account, select "Compromised Account."
An ISIC team member will reach out to you with details regarding the results of the investigation into the security event.