If you think you may have been compromised, or notice any suspicious activity occurring, you should take action as soon as possible to prevent any exposure to data or other university systems, and take the following steps: