Feature 1

Department Slider


Custom text


Beware of Scams Related to Marshall Fire

The Boulder County District Attorney's Office has received reports of scams and phishing emails related to the Marshall Fire:
  • Insurance agents/companies reaching out unexpectedly to you and providing too good to be true options.
  • Contractors calling to give you a “deal” on fire clean up.
  • Charities reaching out to you requesting monetary donations in support of the Fire Department, Law Enforcement, or Victims.
  • Fundraisers or “Go Fund Me” pages that are not endorsed by the people or organizations they are supposed to help.

See tipsheet to learn more

Custom text

Do Your Part. Be Cyber Smart

Take precautions to avoid accidental disclosure of personally identifiable information (PII) or sensitive university information when sharing through email:

  • Be mindful when using “Replying All” as it may include individuals who do not have a business need-to-know.
  • Be careful with email auto-complete, a feature that automatically completes a name for you when you begin typing it in the TO field. It may enter the wrong name. Check the TO field a second time before sending the email.
  • Password protect attachments. 

Consult with your campus IT department about other options for sending sensitive university information, especially when related to HIPAA. 


News channel


Be Cyber Smart: Learn the Basic Terms
Being cyber smart is one of the best ways to protect yourself and others from cybercriminals. Learn these terms and increase your cyber smart IQ.
Read more

VPN Ipad
HIPAA and Knowing Your Audience

When sharing personally identifiable information (PII) and protected health information (PHI), get in the habit of thinking about your audience twofold: who is the subject and who is the recipient?
Read more 

Is Your Password Strong Enough?

Learn about how to check and strengthen your passwords
Read more 

fishing hook
Roger Grimes, "Fight the Phish" Webinar 

Learn about phishing emails, how to recognize them, and fight them
Recording Now Available 

Custom text

Top 5 Policies and Standards to Know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance

Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe

Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)

Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems

Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.

Custom text