Skip to main content

What’s the process for triaging abuse reports?

Initial assessment: categorize report type (spam, **phishing**, **malware**, **impersonation**), assess credibility (evidence provided, reporter reliability), and evaluate severity (targeting, potential harm).

Investigation: examine reported content, check for patterns across multiple reports, verify claims through technical analysis, and determine whether issue is ongoing or resolved.

Prioritization: immediate response for active threats, standard process for routine reports, and escalation for significant incidents. Document all reports for trend analysis and compliance.