Cybersecurity
September 27, 2023
Who do I Report suspicious activity to?
Reporting is a key internal control that needs to be implemented at state agencies to prevent fraud, waste, and abuse of Commonwealth resources. Employees should be trained to identify fraudulent or suspicious activity and where to report.
Action Steps
Pause and Report suspicious requests or any requests that appear odd. Alert your IT security staff to scan any suspicious email, link or attachment before you open.
If you have a Phish Alert Report option in your email, it’s as simple as one click.