Feature Articles
Be Cyber Safe During Summer Vacations
Technology is a key asset during our vacations. We use it for travel planning, purchases and staying in contact with family and friends. Cybercriminals count on vacationers being easily distracted and willing to use unfamiliar resources to stay connected.
Custom text
Important to Know
CU or any reputable organization will never ask for your passwords in an email, text or phone call.Sensitive university data must be protected from compromise, such as unauthorized or accidental access, use, modification, destruction or disclosure.
Learn more about Data Governance.New Information Security Training Requirement
Effective Oct. 2, all CU employees (faculty, staff, and student employees) must complete the university’s Information Security Awareness training course within the first 60 days of employment and every two years thereafter. Learn more.
News
News channel
Articles
Incorporate these top 10 security-positive behaviors into your computing routine.
Read More
QR codes come with risks. Consider these tips to avoid being a victim.
Read more
Kids are especially vulnerable to cybercrime. Teach them good security behaviors.
Read more
Top Policies and Standards
Custom text
Top Policies and Standards to Know
IT Security Program
Serves as the core for the university's information security activities and provides general guidance.
Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe.
Data Governance
Ensures university data is managed as a material asset.
Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems.