Reporting Cyber Security Incidents
If you receive a phishing email that you have not interacted with (e.g., clicking links, replying, or calling), refer to ‘Reporting a Phishing Email.’ For any other suspicious activity or suspected/actual incidents or breaches, follow the procedures outlined below.
- Recognize Suspicious Activity
- Be alert for signs such as:
- Unusual system behavior (slow performance, pop-ups, or crashes)
- Unauthorized access to systems or data
- Suspicious emails (phishing), attachments, or links
- Missing or corrupted files
- Unauthorized changes to files or settings
- Report Immediately
- Contact the incident response team immediately via:
- Email: support@trinityinfo.org
- Phone:
- Stew Thompson: (231) 468-9140
- Mark Walton: (231) 580-9529
- Slack: Report in the #techsupport channel
- Provide Key Details
- Describe the suspicious activity or issue.
- Provide the time and date of the incident.
- Include any relevant emails, screenshots, or error messages.
- Specify the systems or devices affected.
- Disconnect from the Network
- If you suspect ransomware, other malware, or unauthorized access, disconnect your computer from the internet or network to prevent further damage.
- Await Instructions
- Follow any immediate instructions from the incident response team.
- Do not use the device until cleared by the incident response team.
- Do not communicate about the incident over potentially compromised systems.
- Do Not Share Information
- Keep the incident confidential. Avoid discussing it with colleagues or external parties until further notice from the incident response team or leadership.
- Follow Up
- Be ready to provide any additional information needed for investigation.
- Keep an eye on further instructions or training following the incident.