Overview
Through established investigation procedures and defined incident‑handling processes, IT Security analyzes reported events to determine impact, contain threats, and coordinate appropriate remediation actions. This service supports the university’s operational, legal, and compliance responsibilities by ensuring that incidents—whether malware infections, unauthorized access, or system vulnerabilities—are addressed quickly and consistently. It also serves as a central channel for reporting suspicious activity, enabling proactive protection of institutional resources
Who can use this Service?
JMU faculty, staff, and students.
How can I get this Service?
Questions or concerns related to Security incidents or related reponses can be submitted through their respected requests
Where can I get Help/Support?
Report questions or any issues by contacting the IT Help Desk.
Quick-start FAQ's
Features:
- Report a Possible Malware or Virus: Report suspected malware or viruses on JMU-Owned devices for investigation and remediation.
- Report Abuse or Unauthorized Use of JMU Systems: Report suspicious, abusive, or unauthorized use of JMU systems for security investigation.
- Report an Issue or Vulnerability with a JMU System: Report potential security vulnerabilities or system issues for assessment and remediation.