Selio-logo
HomePrivacy and Security

Respond to Suspicious Access or Activity

Who is this article for?

Owners, managers, admins, and support-facing decision-makers responsible for security response.

Respond to Suspicious Access or Activity

Summary

Respond quickly to suspicious access or unusual activity so your business can reduce risk before the issue spreads.

Before you begin

  • Identify the exact issue first
  • Confirm whether the problem is about login, permissions, a suspicious device, unusual account behavior, or abnormal traffic
  • Do not ignore “small” anomalies during live operations
  • Make sure the business knows who owns first response

Steps

  1. Identify which account, device, or workflow looks suspicious.
  2. Confirm whether the behavior is truly unexpected or simply operational misunderstanding.
  3. Restrict or review access if the risk is real.
  4. Check affected devices and user roles immediately.
  5. Reconfirm the correct account and business context.
  6. Escalate internally and document what happened.
  7. Contact Selio Support if the issue goes beyond normal operational correction.

Troubleshooting

  • A user sees access they should not have: Treat it as urgent and review permissions immediately.
  • A login pattern looks unusual: Verify the account, access path, and recent role changes first.
  • The team assumes Google protections mean no human response is needed: Automated protections reduce risk, but human escalation is still critical.
  • Managers are unsure whether to escalate: Escalate early when the risk touches access, customer data, or abnormal account behavior.