Incident Management
/https://siu.edu/search-results.php
Last Updated: Jun 04, 2025, 11:50 AM
Preventing Unauthorized Access
Information Security is dedicated to preventing unauthorized access to SIU networks, systems, and devices. The team also plays a critical role in protecting sensitive information stored within University systems and shared across campus. As a result, most security events are detected either by the Information Security team or by vigilant LAN Administrators who monitor for unusual activity.
What is a Security Event or Breach?
A security event occurs when a student, faculty, or staff member notices that a device or system is behaving abnormally—enough to warrant alerting the Information Security team. In response, the team may either resolve the issue quickly or conduct a detailed investigation to determine whether someone attempted to bypass the University's security measures.
If the investigation reveals a credible threat, malicious activity, or evidence of unauthorized access, the situation is elevated to a security breach. Breaches put University systems, sensitive data, financial resources, and the safety of our community at risk.
Examples of security breaches include:
-
Unauthorized access to any University system
-
Theft or exposure of confidential or sensitive information
-
Use of malicious software (e.g., viruses, malware) to access or damage data
-
Loss or theft of a University-owned device (e.g., computer, laptop, phone, tablet, external drive, or USB stick)
Depending on the nature of the breach and the data involved, reporting to University leadership or external regulatory agencies may be required.
University Devices: What should be reported?
Note: Loss or theft of university-owned devices must be reported to Information Security immediately.
What Happened |
Report to |
Contact Information |
Received or suspect a scam email |
Information Security |
Right-click on the email and select the "Report Phishing" option. |
Clicked a suspicious link or provided sensitive information |
Information Security |
Call SalukiTech at (618) 453-5155 |
Suspect physical or system threat or breach |
Information Security |
|
Suspect physical or system threat or breach |
Information Security SIU Department of Public Safety |
|
Lost a university-owned device, external drive, or memory stick |
Information Security |
Security events:
Security events at SIU should be reported and investigated to determine if an event requires an official “notification of exposure” as determined by SIU policy; contract agreements; state or federal law; or regulations such as FERPA, HIPAA, PCI. It is important to report suspected events promptly, so Security can determine if the event is a problem that needs to be resolved, or if the event is an actual security breach. Urgency in reporting and in taking action is essential, as a major security breach will certainly result in a loss of trust in the University by our students, faculty, staff, vendors, and community. Failure to report an event may result in disciplinary action, legal action, and/or fines from regulatory entities.
Personal Devices: What should be reported?
What Happened |
Report to |
Contact Information |
Received or suspect a scam email |
Information Security |
Right-click on the email and select the "Report Phishing" option. |
Clicked a suspicious link or provided personal information |
Information Security |
Call SalukiTech at (618) 453-5155 |
Had a personal device stolen |
SIU Department of Public Safety |
If you have any personal information on the device, you may need to contact all of your account holders. |
Lost a personal device, external drive, or memory stick |
SIU Lost and Found |
If you have any personal information on the device, you may need to contact all of your account holders. |