Information Security Incident Response

Request help with Incident Response services here. For more information and how-to articles, visit our Knowledge Base.

About

The Information Security team investigates and responds to Information Security Incidents as outlined in the Campus Information Privacy and Security Policy, incident notifications from Minnesota State System Office or other subscribed network monitoring services, and Digital Millennium Copyright Act takedown notifications. We investigate and respond to phishing messages, virus and/or malware reports, and compromised credentials.

Account/Email Compromise

If a customer’s email or StarID account is suspected to be compromised, the Information Security team will investigate and assist in any remediation necessary to resolve the compromise and prevent further compromise.

Asset Recovery

The Information Security team, working with University Security and potentially local law enforcement, will attempt to locate and recover missing/lost/stolen state technology assets.

Copyright Violation Notice

Upon alleged copyright infringement notification from a copyright holder, or their representative, the Information Security team will investigate and determine the source of the copyright infringement. Appropriate actions will be taken based on the result of the alleged copyright violation.

Cybersecurity Incident Investigation

At the direction of the President’s Office, Human Resources, Title IX office, University Security, Student Conduct, or the University CIO, the Information Security team will investigate potential violations of Minnesota State Board Policy 5.22 Acceptable Use of Computers and Technology Resources and/or Board Policy 5.23 Security and Privacy of Information Resources.

Malware/Virus

Upon notification or suspicion that a customer’s system has been infected by malware and/or virus(es), the Information Security team will work with the IT Solutions Center and/or the customer to remediate such infection.

System Compromise

Upon notification or suspicion that a University owned system has been compromised, the Information Security team will work with the system owner to identify, remediate and prevent any compromises.