
Feature Articles
Are You Doing These 7 Things to Keep Your Personal Data Secure?
As the threat of cyberattacks increases against the U.S. infrastructure, organizations are enhancing their cyber defenses. Since we all share the responsibility, here are seven things you can do to help keep your financial and personal data secure.
Information security experts consider phishing scams to be the leading online threat to people at work and home.
Custom text
Important to know
Custom text
Everyone Shares in Cybersecurity Responsibility
Be sure to complete these required courses to learn about your responsibility in safekeeping CU information.
- Information Security and Privacy Awareness. This course must be completed by all CU new hires within 60 days. Since the course is updated annually, consider retaking the course each Fall. You will learn about data classification, phishing scams, insider threats, and more.
- Information Security for IT Service Providers. This course, which was recently revamped, must be completed by ITSPs universitywide. ITSPs design, build, implement, support, or provide services to university departments or individuals. The course covers policy, security management, access management, physical and environmental security, and incident detection, and reporting.
Visit Available Training for more information.
News
News channel
Articles

Learn what the main social media scams are and how to avoid them.
Read More

Being cyber smart is one of the best ways to protect yourself and others from cybercriminals. Learn these terms and increase your cyber smart IQ.
Read more

Learn how to differentiate between a job offer and an ID Theft Trap.
Read more

Learn about how to check and strengthen your passwords
Read more
Custom text
Top 5 Policies and Standards to Know
IT Security Program
Serves as the core for the university's information security activities and provides general guidance
Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe
Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)
Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems
Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.
Custom text