Feature 1

Feature 1

October is Cybersecurity Awareness Month

Tips & Stay Informed

Custom text

OIS offers services to help secure information

Keep your family secure online

Alert Info Box

Keep tabs on your applications

Most internet-connected appliances, toys, and devices are supported by a mobile application. Your mobile device could be filled with suspicious apps running in the background, or using default permissions you never realized you approved—gathering your personal information without your knowledge, while also putting your identity at risk. Check your app permissions and delete what you don’t need or no longer use.
 

News

New channel

Email Security
Emailing Sensitive University Information
Read more

Phishing Awareness Program
CU's Phishing Awareness Program 
Read more

Ransomware
What is Ransomware?
Read more

Gift Card Email
Gift Card Phishing Scam 
Read more

 

Custom text

Top 5 Policies & Standards to know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance


Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe


Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)


Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems


Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.