Incident Reporting

Cybersecurity Incident Reporting Procedure


To ensure timely response, any College employee who suspects that a cybersecurity incident has occurred shall promptly notify the NWTC Help Desk, (800) 422-NWTC, ext. 6800 or (920) 498-6800.  During off hours or campus closure, notification shall be made to the 24/7 Student Help Line. (800) 422-NWTC, ext. 6900 or (866) 235-5037.
In the event that a potential incident involves a campus computer, stop using the system immediately.  It is critical that involved parties await further instructions from Information Instructional Technology staff prior to continued operation of the computer.  Upon notification of a cybersecurity incident, IIT staff will engage the Cybersecurity Incident Response Team, who will follow internal incident handling procedures and notification protocol.

What is a cybersecurity incident? 
A single or series of adverse events in an information system, network, or the threat of the occurrence of such an event.  An incident implies harm, or the attempt to do harm.  Below is a list of common cybersecurity incidents which should be immediately reported to the NWTC Help Desk.

Malware - Any malicious or unauthorized software installed on a computer system, mobile device, or any other physical technology that is susceptible to malware.  Examples of malware include viruses, trojans, worms, rootkits, keyloggers, spyware, and ransomware. Report any suspicious software applications to the NWTC Help Desk.

Unauthorized Access - Any use of a computer, network, or information system without permission from the owner.  An example of this would be accessing someone's email account without their knowledge.

Phishing Scam - An attempt to obtain sensitive information or unauthorized access to a computer system, network, or application, often through email.This includes email scams and targeted “spear-fishing” with advanced social engineering.  Excessive amounts of unwanted junk email should also be reported to the Help Desk.

Probe/Network Scan - Unauthorized reconnaissance of a computer system or network such as packet capturing, network scanning, or vulnerability scanning.

Data Tampering - The unauthorized manipulation (adding, changing, or removal) of data.

Compromised Credentials - NWTC customers are assigned their own login ID and password which should not be shared with anyone else.  If you suspect that somebody else is using your login account, contact the NWTC Help Desk Immediately.

Privacy/Sensitive Data Leak - The unauthorized disclosure of protected data on a campus computer system, network, or application.  Examples of sensitive data include personal identifiable information, financial, health and student records.

If you have any questions please contact the NWTC Help Desk.

Monday - Thursday | 7:00AM - 10:00PM
Friday | 7:00AM - 5:00PM
Saturday | 8:00AM - 4:00PM