{"id":708,"date":"2025-10-20T08:00:05","date_gmt":"2025-10-20T12:00:05","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=708"},"modified":"2026-02-16T16:09:51","modified_gmt":"2026-02-16T21:09:51","slug":"the-cyber-incident-protocol","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/10\/20\/the-cyber-incident-protocol\/","title":{"rendered":"NCSAM 2025 – If You See Something, Report It \u2013 The Cyber Incident Protocol"},"content":{"rendered":"
Mission Objective: Report. Respond. Resist.<\/strong><\/p>\n Congratulations, Agent.<\/p>\n You\u2019ve made it to the final transmission in our Cybersecurity Awareness Month series. If you\u2019ve been following along, you now know how to recognize dangerous downloads, avoid alien artifacts, stay off the satellite radar, and think critically before sharing intel online.<\/p>\n But here\u2019s the most important directive of all:<\/p>\n REPORT SUSPICIOUS ACTIVITY IMMEDIATELY.<\/strong><\/p>\n Every second counts when facing a cyber threat. The faster it\u2019s reported, the faster the response\u2014and the fewer systems or people get pulled into the breach.<\/p>\n Waiting to report could mean:<\/p>\n More accounts compromised<\/p>\n<\/li>\n More data exposed<\/p>\n<\/li>\n More time for attackers to dig deeper<\/p>\n<\/li>\n Delayed protection for others on the network<\/p>\n<\/li>\n<\/ul>\n In short: your vigilance protects everyone<\/em><\/strong>.<\/p>\n Look for urgent or unexpected messages, strange links, or fake sender addresses.<\/p>\n Action:<\/strong> Use the PAB<\/a> or forward it to phishfiles@montclair.edu<\/a>.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n Don\u2019t panic. But don\u2019t cover it up.<\/p>\n Action:<\/strong> Immediately report what happened\u2014time, device, and details help us respond fast.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n If someone is pretending to be IT, financial aid, or even you<\/em>, it\u2019s a red flag.<\/p>\n Action:<\/strong> Screenshot and send it in. The more we know, the more we can block.<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n Password changed? Logins from strange locations? MFA requests you didn\u2019t approve?<\/p>\n Action:<\/strong> Report it via the PAB<\/a> or email it to phishfiles@montclair.edu<\/a>. Don\u2019t wait to \u201csee what happens.\u201d<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n Cybersecurity isn\u2019t just an IT job\u2014it\u2019s a team mission.<\/strong> This concludes your Cybersecurity Awareness Month briefing. You\u2019ve trained well, Agent.<\/p>\n They\u2019re always watching. Good thing\u2014you are, too.<\/strong><\/p>\n CrowdStrike | Introduction to Phishing<\/a><\/p>\n Liberty Technology | How to Report a Phishing Attack and Why It\u2019s So Important<\/a><\/p>\n ScienceDirect | Scamming higher ed: An analysis of phishing content and trends<\/a><\/p>\n Association for Computing Machinery | From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem<\/a><\/p>\n Google | Phishing Campaigns Targeting Higher Education Institutions<\/a><\/p>\n
\nWhy Timely Reporting Matters<\/h2>\n
\n
\nGuide to Spot & Report Cyber Threats<\/h2>\n
Suspicious Email?<\/strong><\/h3>\n
\n
\n
Accidental Click or File Opened?<\/strong><\/h3>\n
\n
\n
Scam Message or Social Media Trick?<\/strong><\/h3>\n
\n
\n
Unusual Account Activity?<\/strong><\/h3>\n
\n
\n
\nRemember, Agent:<\/h2>\n
Your quick action might be the reason a major breach never happens. Stay alert. Stay vocal. And when in doubt\u2014report.<\/p>\n
\nWant to Learn More?<\/h2>\n