DETECT

How might we quickly recognize and respond to security threats before they cause harm?

Early detection of security incidents helps minimize damage. IT Security continuously monitors systems, conducts security audits, and analyzes activity for potential threats—but an aware and engaged user community is also crucial in identifying suspicious activity.

Best Practices

  • Report phishing emails, unauthorized access attempts, and other anomalies to IT Security.
  • Be mindful of security alerts and follow guidance if action is required.
  • Check your login history for unexpected activity if you receive an unusual notification.
warning sign

Call To Action

IT actively monitors logs and threats.

Regular security audits and penetration tests are conducted by IT Security to proactively identify risks.

Users can help by staying vigilant and reporting suspicious emails, logins, or system behavior.

If something seems off, don’t ignore it—report it!

Key Questions Answered

What should I do if I receive a phishing email?

Report the phish using the built-in phishing/junk mail reporting buttons in your Outlook email client.

How does IT Security detect threats?

Through Security Information and Event Management (SIEM) monitoring, security audits, desktop management, and user reports.

Available Tools & Resources

  • Security Information and Event Management (SIEM) – IT Security uses SIEM tools to detect anomalies and potential threats in real time.

  • Regular security audits and penetration testing – Conducted by IT Security to identify vulnerabilities before attackers do.

  • Email security filtering – Helps block phishing attempts before they reach users.

  • Incident reporting mechanisms – Report suspicious activity.

  • A vigilant and informed user base – Users who report suspicious activity play a critical role in security.