This page outlines the official cybersecurity incident reporting procedure for our organization. Please follow these steps to ensure timely and effective response to security threats:

  1. Identify the Incident 📌

    • Recognize suspicious activity (e.g., phishing attempts, unauthorized access)
    • Document timestamps, affected systems, and potential impact
      Security Alert
  2. Initial Response 🚨

    • Isolate affected devices or networks immediately
    • Avoid sharing sensitive data until investigation is complete
      Incident Response
  3. Submit a Report 📄
    Use our secure portal at /en/resources/cybersecurity-center/reporting-guide to file detailed documentation

    Reporting Template

  4. Collaborate with Security Team 🤝

    • Provide all relevant evidence and logs
    • Follow instructions for system access during investigation
      Teamwork

For additional resources, visit our Cybersecurity Center to learn about threat detection and prevention strategies.

Cybersecurity Center