Please enable JavaScript in your browser to complete this form.Incident Reporting - Step 1 of 3Which type of incident is being reported? *Select Incident TypeAccount CompromiseExcessive Phishing EmailsExcessive SPAM EmailsPhishing Compromise (Action Taken)Voice Solicitation (Vishing) AttemptVirus or other type of malwareDenial of Service AttackLost/ Stolen Removable MediaLost/ Stolen Laptop or DesktopLost/ Stolen Mobile DeviceData Destruction/ ErasureRecommended Playbook(s)Addressing Denial of Service Addressing Account Compromise Addressing Virus or Malware AttackBrowse Playbooks Reporting DetailsReporting Employee NameFirstLastEmail *PhoneWhen was the incident reported?DateTimeDoes the user have any administrative privilegesOperating System AdministratorNetwork AdministratorApplication AdministratorDatabase AdministratorContact DetailsNextIncident DetailsWhich primary user was involved in the incident?FirstLastEmailPhoneDate / Time incident occurred? *DateTimeDevice Name - Type - Model - ManufacturerIP AddressDescribe the incidentCopy and paste indicator log details (label each log section with the name of the log extracted from)Website used in attack? Upload a copy of the Phishing email Click or drag a file to this area to upload. NextIncident Status? *The incident is ongoingThe incident is contained and being investigatedThe incident has endedIncident resulted in?What happened?DoSUnauthorized Network AccessUnauthorized data access, modification, or erasureWere any playbooks followed?Denial of ServiceExcessive SPAM Email VictimPhishing AttackAccount CompromiseOtherIncident ResolutionSystem RestoredMalware RemovedEmployee TrainingBreach NotificationAdditional NotesSubmit