This page outlines the official cybersecurity incident reporting procedure for our organization. Please follow these steps to ensure timely and effective response to security threats:
Identify the Incident 📌
- Recognize suspicious activity (e.g., phishing attempts, unauthorized access)
- Document timestamps, affected systems, and potential impactSecurity Alert
Initial Response 🚨
- Isolate affected devices or networks immediately
- Avoid sharing sensitive data until investigation is completeIncident Response
Submit a Report 📄
Use our secure portal at /en/resources/cybersecurity-center/reporting-guide to file detailed documentationReporting TemplateCollaborate with Security Team 🤝
- Provide all relevant evidence and logs
- Follow instructions for system access during investigationTeamwork
For additional resources, visit our Cybersecurity Center to learn about threat detection and prevention strategies.
Cybersecurity Center