{"id":110,"date":"2020-04-27T12:42:23","date_gmt":"2020-04-27T12:42:23","guid":{"rendered":"https:\/\/www.jsums.edu\/cyberawareclone-demo\/?page_id=110"},"modified":"2025-10-07T15:11:26","modified_gmt":"2025-10-07T15:11:26","slug":"cyber-incident-reporting","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/jsu-cyber-security\/cyber-incident-reporting\/","title":{"rendered":"Cyber Incident Reporting"},"content":{"rendered":"<p><span style=\"color: #009bde;\">Instructions:<\/span> Please call or email the Information Security Officer, or the JSU email administrator with information about a Cyber Incident. We will review the incident information and contact you shortly to ask any additional questions that will assist in resolving the issue.<\/p>\n<p><strong>If you have any questions or concerns or would like to report a cyber incident please contact:<\/strong><\/p>\n<p>Dameion Brown, CPP<br \/>\nDirector of Information Security<br \/>\nChief Information Security Officer (CISO)<br \/>\nOffice Phone:601-979-1005<\/p>\n<p>Josiah Dosunmu<br \/>\n<span style=\"color: #000080;\">Email Administrator<\/span><br \/>\nOffice Phone:601-979-2312<\/p>\n<p><strong>Contact Email<\/strong>:<span style=\"color: #000080;\">\u00a0<a href=\"mailto:cybersecurity@jsums.edu\">cybersecurity@jsums.edu<\/a><\/span><\/p>\n<p><strong>For Staff:<\/strong> 601-979-6400<\/p>\n<p><strong>For Students:<\/strong> 601-979-0245<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Instructions: Please call or email the Information Security Officer, or the JSU email administrator with information about a Cyber Incident. We will review the incident information and contact you shortly to ask any additional questions that will assist in resolving the issue. If you have any questions or concerns or would like to report a [&hellip;]<\/p>\n","protected":false},"author":131,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/110"}],"collection":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/users\/131"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/comments?post=110"}],"version-history":[{"count":6,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/110\/revisions"}],"predecessor-version":[{"id":1493,"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/pages\/110\/revisions\/1493"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/jsu-cyber-security\/wp-json\/wp\/v2\/media?parent=110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}