Compromised Account or Device

Requests must be completed by the person who is compromised. Once submitted, the IT Security Incident Response Team will respond with the next steps.

Following links or downloading files from phishing emails and visiting suspicious websites can lead to a compromised account or UTC-issued device. The IT Security Incident Response Team provides assistance in recovering your account or device and will work with the University Police when necessary.

 
Request Service

Details

Service ID: 49827
Created
Wed 4/28/21 12:51 PM
Modified
Thu 8/8/24 11:53 AM