If you believe your device has been compromised—whether through suspicious activity, unauthorized access, or malware infection—you can report the incident to University Technology Services (UTS) for investigation. Examples include unexpected software behavior, antivirus alerts, or evidence of phishing links being opened.
Prerequisites and Expectations
Before submitting a report, gather any relevant details about the incident, such as error messages, suspicious emails, browser activity, or screenshots that might help with the investigation. Users may be asked to stop using the device temporarily to prevent further risk. If warranted, the device may be remotely accessed, quarantined, or brought to the OU Technology Center for hands-on support. In cases where a broader security concern is identified, the issue may be escalated to the UTS Security team for further action.
Learn More
See the "Related Articles" section to view knowledge base articles related to this service.
Cost
No charge.