Incident Reporting

Cybersecurity Incident Reporting Procedure


To ensure timely response, any College employee who suspects that a cybersecurity incident has occurred shall promptly notify the NWTC Help Desk, (800) 422-NWTC, ext. 6800 or (920) 498-6800.  During off hours or campus closure, notification shall be made to the 24/7 Student Help Line, (800) 422-NWTC, ext. 6900 or (866) 235-5037.

In the event that a potential incident involves a campus computer, stop using the system immediately.  It is critical that those involved await further instruction from Information Instructional Technology (IIT) staff prior to continued operation of the computer.  Upon notification of a cybersecurity incident, IIT staff will engage the Cybersecurity Incident Response Team, who will follow internal incident handling procedures and notification protocol.

What is a cybersecurity incident? 
A single or series of adverse events in an information system, network, or the threat of the occurrence of such an event.  An incident implies harm, or the attempt to do harm.  Below is a list of common cybersecurity incidents which should be immediately reported to the NWTC Help Desk.

Malware - Malicious software installed on a computer system, mobile device, or other technology susceptible to malware.  Examples of malware include viruses, trojans, worms, rootkits, keyloggers, spyware, and ransomware. Report any suspicious software applications to the NWTC Help Desk.

Unauthorized Access - Any use of a computer, network, or information system without permission from the owner.  An example of this would be accessing someone's email account without their knowledge.

Phishing Scam - The use of email that appears to originate from a trusted source to trick you into providing sensitive information, usernames and passwords, or to open an infected attachment. Typically phishing emails and associated web sites will look like they are part of a trusted organization or partner you are doing business with.

Probe/Network Scan - Unauthorized reconnaissance of a computer system or network such as packet capturing, network scanning, or vulnerability scanning.

Data Tampering - The unauthorized manipulation (adding, changing, or removal) of data.

Compromised Credentials - NWTC customers are assigned their own login ID and password which should not be shared with anyone else.  If you suspect that somebody else is using your login account, contact the NWTC Help Desk immediately.

Privacy/Sensitive Data Leak - The unauthorized disclosure of protected data on a campus computer system, network, or application.  Examples of sensitive data include personal identifiable information, financial, health and student records.

If you have any questions please contact the NWTC Help Desk.