
Feature Articles
Keep Secure When Shopping Online
Be mindful of these tips to help keep your financial and personal information secure.
Online scams are more sophisticated.
Custom text
New Information Security Training Requirement
Effective Oct. 2, all CU employees (faculty, staff, and student employees) must complete the university’s Information Security Awareness training course within the first 60 days of employment and every two years thereafter. Learn more.
What is Quishing and How to Protect Yourself
Quishing is the use of a QR code that directs you to a fraudulent website. Once on the site, cybercriminals work to steal your personal and financial information. Learn more.
News
News channel
Articles

Incorporate these top 10 security-positive behaviors into your computing routine.
Read More


Learn the signs and what to do for assistance.
Read more

Kids are especially vulnerable to cybercrime. Teach them good security behaviors.
Read more
Custom text
Top 5 Policies and Standards to Know
IT Security Program
Serves as the core for the university's information security activities and provides general guidance
Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe
Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)
Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems
Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.
Custom text