Have you ever wondered what IU does when university email accounts are hacked? Well, we’ve got answers.
Upon receiving an incident report, the University Information Policy Office (UIPO) incident response team will follow the incident response procedures. As a general practice, the UIPO will attempt to immediately sever access by any unauthorized users to the compromised IU network accounts or resources.