|Title||Start Date & Time||End Date & Time|
|Service Maintenance Completed: Wired & Wireless Networks in Multiple Buildings||Thursday, April 25, 2019 - 5:00am||Thursday, April 25, 2019 - 7:30am|
|Service Restored: Network issues in multiple buildings||Thursday, April 25, 2019 - 8:20am||Thursday, April 25, 2019 - 8:47am|
|Service Maintenance Scheduled: UCB Files (routine monthly maintenance)||Friday, April 26, 2019 - 10:00pm||Friday, April 26, 2019 - 11:59pm|
|Service Maintenance Scheduled: Enterprise Applications Including Campus Solutions & Portals||Sunday, April 28, 2019 - 6:00am||Sunday, April 28, 2019 - 6:00pm|
|Service Maintenance Scheduled: Oracle Identity Manager (identikey.colorado.edu)||Tuesday, April 30, 2019 - 4:00am||Tuesday, April 30, 2019 - 7:00am|
|Service Maintenance Scheduled: Wi-Fi in Multiple Buildings||Thursday, May 16, 2019 - 4:30am||Thursday, May 16, 2019 - 6:00am|
|Service Maintenance Scheduled: Networks in Multiple Buildings||Monday, March 25, 2019 (All day)||Monday, July 22, 2019 - 11:59pm|
Keeping the campus community safe from malicious attempts to steal personal information, also known as phishing, requires constant vigilance. Because phishing attempts often target only a select number of people in the campus community, our ability to alert the campus is dependent on people like you reporting any suspected phishing attempts. We appreciate your willingness to report phishing attempts as it makes the Internet a safer place for the entire campus community.
If you have received a message that you believe could be a malicious attempt to gain personal information and it is not already listed on the Phishing Emails page, please report it. To report a message you suspect to be an email scam or phishing attack, please send that message as an attachment (RFC-822 MIME encoded) to email@example.com.
If you do not know how to send a message as an attachment, please follow the directions below for your email program. When the message is sent as an attachment it includes header information which can be used to identify the source of the message which can in turn help us block delivery of the message to other people on our campus or prevent visits to phishing sites.