Security Incident Response and Investigation

Overview

Through established investigation procedures and defined incident‑handling processes, IT Security analyzes reported events to determine impact, contain threats, and coordinate appropriate remediation actions. This service supports the university’s operational, legal, and compliance responsibilities by ensuring that incidents—whether malware infections, unauthorized access, or system vulnerabilities—are addressed quickly and consistently. It also serves as a central channel for reporting suspicious activity, enabling proactive protection of institutional resources

Who can use this Service?

JMU faculty, staff, and students.

How can I get this Service?

Questions or concerns related to Security incidents or related reponses can be submitted through their respected requests

Where can I get Help/Support?

Report questions or any issues by contacting the IT Help Desk.

Quick-start FAQ's

Features:

  • Report a Possible Malware or Virus: Report suspected malware or viruses on JMU-Owned devices for investigation and remediation.
  • Report Abuse or Unauthorized Use of JMU Systems: Report suspicious, abusive, or unauthorized use of JMU systems for security investigation.
  • Report an Issue or Vulnerability with a JMU System: Report potential security vulnerabilities or system issues for assessment and remediation.
 
Report Malware or Virus Report Potential Abuse Report a Vulnerability

Service Offerings (3)

Report a Possible Malware or Virus
Report suspected malware or viruses on JMU-Owned devices for investigation and remediation.
Report Abuse or Unauthorized Use of JMU Systems
Report suspicious, abusive, or unauthorized use of JMU systems for security investigation.
Report an Issue or Vulnerability with a JMU System
Report potential security vulnerabilities or system issues for assessment and remediation.