STORY
Register now: CU Data Governance Workshop
0

Register now: CU Data Governance Workshop

The CU system Office of Academic Affairs, in collaboration with the Office of Information Security, invites students, faculty and staff from across the...
STORY
Cybersecurity Awareness Month elevates culture of safety
0

Cybersecurity Awareness Month elevates culture of safety

The University of Colorado Office of Information Security points to October’s Cybersecurity Awareness Month as an opportunity to continue fostering a security...
STORY
Cyberattack
0

More CU community members notified of cyberattack

Additional members of the CU community – students, employees and alumni – whose personal information may have been compromised in the cyberattack on university...
STORY
From the Office of Information Security: Tips for secure online shopping

From the Office of Information Security: Tips for secure online shopping

More of us will be conducting our holiday shopping online due to COVID-19 and the restrictions placed on in-store traffic. Holiday online sales are expected to...
STORY
Cybersecurity Awareness Month aims to strengthen online safety
0

Cybersecurity Awareness Month aims to strengthen online safety

October is Cybersecurity Awareness Month, a global effort to help everyone stay protected whenever and however you connect. The overarching theme for the month...
STORY
0

Hacking requires quick response

Using computers on the Internet is like driving a car on the road: You take steps to protect yourself but sooner or later an accident may happen. With...
STORY
0

Protect your computer

Your computer has become a critical part of your daily life. You use your computer at home for a variety of activities, such as online shopping, managing your...
STORY
0

Protecting data

Information is a critical university asset and it is incumbent upon all employees to ensure the protection of sensitive information. It is primarily our data,...
STORY
0

Securing your mobile devices

Mobile devices such as smartphones have become one of the primary ways people communicate and interact with the Internet. You can instantly talk to or message...
STORY
0

Using email safely

Email is one of the fastest, simplest ways to communicate around the world, but also has become a primary method used by cybercriminals to attack others on the...
STORY
0

Hacking your mind

Cybercriminals have learned that the easiest way to take control of your computer or steal your passwords is to simply ask you for them. Social engineering...
STORY
0

No one immune from cyberattack

Many people mistakenly believe that cybercriminals do not target them – that their computer or information has no value. In reality, individuals like you are...
STORY
0

Cybersecurity and ethics

Ethics is nothing more than knowing the difference between right and wrong, and choosing to do the right thing. If you maintain your own personal integrity,...
STORY
0

Cyber-security in the material world

When it comes to threats faced by your data and our organization, cyber-attacks are the most common. However, danger also exists in the real world. While not...
STORY
0

Your computer needs protection

Your computer has become a critical part of your daily life. You use your computer at home for a variety of activities, such as online shopping, managing your...
STORY
0

Understanding Wi-Fi security

Wireless technology (often called Wi-Fi) makes it simple for you to connect to the Internet. However, this technology can also make it simple for...
STORY
0

Has your data been hacked?

Using computers on the Internet is like driving a car on the road: You take steps to protect yourself, but sooner or later an accident might happen. Despite...
STORY
Working
0

Working away from the office

Photo by Casey A. Cass/University of Colorado Technology has become extremely powerful, allowing you to connect to the Internet and communicate anytime you...
STORY
0

Protect yourself by protecting university data

Information is a critical university asset – one that all faculty and staff take part in protecting. Data, including Personally Identifiable Information, is...
STORY
0

Learn the keys to keeping that secret word secret

Passwords have become a critical part of our daily lives. We use passwords to log on to a computer, read email, update finances, shop online and watch movies...
STORY
0

Securing mobile devices a must

(Photo by Casey A. Cass/University of Colorado) Mobile devices such as smartphones have become one of the primary tools people use to communicate and interact...
STORY
0

Social networking the safe way

Social Networking sites such as Facebook, LinkedIn and others are powerful tools that allow you to connect and share information with family, friends,...
STORY
0

Browsing the Internet safely

The Internet has become one of your most powerful tools for many tasks, such as searching for information, communicating with friends and co-workers, shopping...
STORY
0

Using email safely

Email is one of the fastest, simplest ways to communicate around the world, but also has become a primary method used by cybercriminals to attack others on the...
STORY
0

Cybercriminals aim to hack your mind

Cybercriminals have learned that the easiest way to take control of your computer or steal your passwords is to simply ask you for them. Known as social...

Pages