Image
Cyber Loss
Report security breaches, including data breaches, unauthorized system access, malware attacks, phishing scams, or other malicious cyber activity.
Process
- Report a Penn State cyber incident to Information Security.
- Information Security shares cyber threats with Risk Management.
- Risk Management contacts the submitter for additional information:
- Name and title
- Phone Number
- Description of loss
- Risk Management submits the loss to the insurance carrier.