Shopping Online

Feature Articles

 

Tactics Used in Phishing Scams

Phishing scams continue to be a top reason for incidents and breaches in the educational services sector. 

Tactics often found in phishing scams range from a fake and malicious web link to a directive that appears to come from a university leader or department.

Learn about tactics and red flags to look for when receiving an unusual or unexpected message.

 

Custom text

Important to Know

CU or any reputable organization will never ask for your passwords in an email, text or phone call.

New Information Security Training Requirement

Effective Oct. 2, all CU employees (faculty, staff, and student employees) must complete the university’s Information Security Awareness training course within the first 60 days of employment and every two years thereafter. Learn more.

What is Quishing and How to Protect Yourself

Quishing is the use of a QR code that directs you to a fraudulent website. Once on the site, cybercriminals work to steal your personal and financial information. Learn more.

News

News channel

Articles

Top 10 Image
Top 10 Actions to Reduce Risk

Incorporate these top 10 security-positive behaviors into your computing routine.
Read More 


Laptop with Learning Image
Available Training
Check out CU’s online security training courses. 
Read more
 

Keyboard with Thumbprint
Compromised or Infected Computer?

Learn the signs and what to do for assistance.
Read more 


Boy at Computer
Keep Your Family Secure Online

Kids are especially vulnerable to cybercrime. Teach them good security behaviors.
Read more 


Custom text

Top 5 Policies and Standards to Know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance


Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe


Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)


Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems


Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.

Custom text