Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

What kind of support can I receive regarding these services?

  • Incident Analysis analysis and Investigationinvestigation
  • Post-incident Information Security recommendations
  • Computer and network monitoring if there is a suspected security incident
  • Phishing/ Spam spam email reporting to sending domain abuse teams

Basic troubleshooting?

  • Phishing/Spam - Carefully carefully scrutinize all incoming email, especially if it is marked as coming from outside the organization
  • Review knowledge-based (KB) articles provided by IS:

How do I get help?

...