Feature Articles

Phishing Scams FAQs

Phishing – when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today.

Learn more.

Custom text

Are your passwords strong enough to withstand an attempted compromise?


News channel


Top 10 Image
Top 10 Actions to Reduce Risk

Incorporate these top 10 security-positive behaviors into your computing routine.
Read More 

Laptop with Learning Image
Available Training
Check out CU’s online security training courses. 
Read more

Keyboard with Thumbprint
Compromised or Infected Computer?

Learn the signs and what to do for assistance.
Read more 

Boy at Computer
Keep Your Family Secure Online

Kids are especially vulnerable to cybercrime. Teach them good security behaviors.
Read more 

Custom text

Top 5 Policies and Standards to Know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance

Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe

Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)

Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems

Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.

Custom text