Feature Articles

Are You Doing These 7 Things to Keep Your Personal Data Secure?

As the threat of cyberattacks increases against the U.S. infrastructure, organizations are enhancing their cyber defenses. Since we all share the responsibility, here are seven things you can do to help keep your financial and personal data secure.

Phishing Scams FAQs

Information security experts consider phishing scams to be the leading online threat to people at work and home.

Custom text

Important to know 

CU or any reputable organization will never ask for your passwords in an email, text, or phone call. 

Custom text

Everyone Shares in Cybersecurity Responsibility

Be sure to complete these required courses to learn about your responsibility in safekeeping CU information. 

  • Information Security and Privacy Awareness. This course must be completed by all CU new hires within 60 days. Since the course is updated annually, consider retaking the course each Fall. You will learn about data classification, phishing scams, insider threats, and more. 
  • Information Security for IT Service Providers. This course, which was recently revamped, must be completed by ITSPs universitywide. ITSPs design, build, implement, support, or provide services to university departments or individuals. The course covers policy, security management, access management, physical and environmental security, and incident detection, and reporting.  

Visit Available Training for more information.  

News

News channel

Articles

fishing hook
Top Three Social Media Scams

Learn what the main social media scams are and how to avoid them.
Read More 


Be Cyber Smart: Learn the Basic Terms
Being cyber smart is one of the best ways to protect yourself and others from cybercriminals. Learn these terms and increase your cyber smart IQ.
Read more
 

VPN Ipad
How to Tell a Job Offer from an ID Theft Trap

Learn how to differentiate between a job offer and an ID Theft Trap.
Read more 


Is Your Password Strong Enough?

Learn about how to check and strengthen your passwords
Read more 


Custom text

Top 5 Policies and Standards to Know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance


Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe


Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)


Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems


Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.

Custom text