|Title||Start Date & Time||End Date & Time|
|Service Issue Updated: Campus Wireless||Monday, February 12, 2018 - 10:05am|
|Service Issue Updated: Northstar||Thursday, May 24, 2018 - 11:28am|
|Service Maintenance Scheduled: UCB Files (routine monthly maintenance)||Friday, June 22, 2018 - 10:00pm||Friday, June 22, 2018 - 11:59pm|
|Service Maintenance Scheduled: Skillsoft||Saturday, June 23, 2018 - 7:00am||Saturday, June 23, 2018 - 7:00pm|
|Service Maintenance Scheduled: Campus Solutions & Portals||Sunday, June 24, 2018 - 6:00am||Sunday, June 24, 2018 - 6:00pm|
|Service Maintenance Scheduled: Network Services in Multiple Buildings||Tuesday, June 26, 2018 - 5:00am||Tuesday, June 26, 2018 - 7:30am|
|Service Maintenance Scheduled: Networks in Farrand, Cockerell, Sewall, Brackett, Aden||Monday, June 25, 2018 - 8:00am||Thursday, June 28, 2018 - 5:00pm|
Not only is computer security something everyone can master; it’s something anyone who uses the Internet must master. Hackers, identity thieves, scammers, and online criminals are becoming increasingly sophisticated. That means you need to be equally adept at fending them off. Use this website to gain the skills you need to keep your technology secure and your information safe.
More IT security awareness and education information can be found on the University of Colorado's Office of Information Security website .
Learn about these topics
Antivirus software is one of the most important tools for safeguarding your computer.
Your web browser is your primary tool for using the Internet. It is also the number one target for cyber criminals.
|Copyright & Fair Use (Information provided by UCB Libraries)||Copyright infringement isn't a faceless crime.|
|You should be highly suspicious of unexpected messages directing you to click on a link or open an attachment, particularly if it’s from someone you don’t know.|
|Encryption||Encryption is the transformation of information into a form that is only readable by those with particular knowledge or technology to prevent others who might have access to the information from reading it. It also serves an important role for stored information to protect it in case of loss or theft.|
|Ethics||If you maintain your own personal integrity, you not only help our organization; you build a reputation that will reward you throughout your career.|
|Hardening Your Computer||Hardening a computer involves several steps to form "layers" of protection. Using antivirus and antispyware protection, regularly downloading the latest manufacturers patches, and disabling unneeded software leads to safer, more secure computers.|
|Securing your mobile devices is like securing your computer. Lock them with a PIN or password, keep them updated and trust only expected messages.|
|Simple passwords can make your life complicated. A password should not be a simple word found in a dictionary or public information such as a pet’s name or a birth date.|
Cyber criminals have learned that the easiest way to take control of your computer or steal your passwords is to simply ask you for them.
|Physical Security||In your exploration of IT Security, it's important to remember physical security. While not as common, physical attacks against our information can have far greater impact.|
|Policies & Procedures||Keeping your computer software up to date isn't just a good idea, it's university policy. Learn more about how university and campus policies can protect you and campus resources.|
|Privacy & Identity Theft||Unauthorized exposure of information such as student academic records, medical information, credit card information, and social security numbers can have a harmful effect on people's lives.|
|Your computer has become a primary target for cyber criminals. Learn strategies for protecting both your work and home computers from this threat.|
|Social Engineering||The key to protecting yourself against social engineering is to trust only communications that you initiate or you expect to receive.|
|Social Networking||Social networking sites are powerful tools that allow you to communicate with friends and family around the world. However, be careful what you share, how you share and with whom.|
|Spyware||Spyware is unwanted software that attaches itself to your computer, often without your knowledge, when you surf the web. It spies on you, and when it does, it noticeably bogs down and can crash your computer. Spyware can even compromise your identity.|
|Wireless Security||Wireless is a shared medium that is broadcast via radio waves. This means that data transmitted by wireless users can be easily captured, making sensitive information (such as social security numbers and credit cards) transmitted wirelessly inherently insecure.|
|Working Outside the Office||Technology is enabling more people to work remotely, either from home or while traveling. This provides you tremendous flexibility but also has certain risks.|
|You Are the Target||Many people mistakenly believe that cyber criminals do not target them, that their computer or information has no value. In reality individuals like you are the cyber criminals’ primary target—you and your computer are under attack every day.|