IS&T can help to detect, respond to, and recover from intrusions and data disclosure incidents. This includes IT security incidents involving electronic MIT business data of any kind.
Benefits and key features
A cyber threat to a computer system can occur two ways: When the system has been accessed by someone without the user's permission or when the system has been infected with malware, which in turn could compromise the data on the computer. IS&T will analyze your system using forensics tools to determine if data was disclosed and if any parties need to be notified of a possible identity theft.
- Forensics: Tools are used to determine the method of the attack and the attack's target within the file system
- Intrusion Analysis: Security technicians will determine if, in fact, data of a sensitive nature could have been disclosed or stolen
- Notification: IS&T works with the Office of General Counsel if a notification to affected parties is determined to be necessary
- Restoration: The system is restored to a clean, workable condition after it has been scrubbed of malware
IS&T's IT Security Services team should be immediately notified if a threat to sensitive data is suspected. Report the security incident to email@example.com.
Note: Handling such incidents can sometimes be time consuming and/or costly. If you have any questions about what might be occurring on a system and whether the occurrence warrants a notice to the Security team, contact the IS&T Service Desk (Building E17).
If there is no sensitive data on a system, there is no need to contact the Security team. You can bring malware-infected machines to the IS&T Service Desk for servicing.
Learn more about Information Protection at MIT.
Lost or stolen computers should be reported to the MIT Campus Police. If any sensitive data was on the computer, also notify firstname.lastname@example.org.