303-735-4357 (5-HELP) or help@colorado.edu
7:30 a.m. – 7:00 p.m.
303-735-4357 (5-HELP) or help@colorado.edu
7:30 a.m. – 7:00 p.m.
Title | Start Date & Time | End Date & Time |
---|---|---|
Service Issue Reported: OIT Networking ITP Resource Tool | Thursday, September 12, 2019 - 8:44am | |
Service Maintenance Scheduled: Oracle Identity Manager & IdentiKey Manager | Friday, December 13, 2019 - 7:30pm | Friday, December 13, 2019 - 9:00pm |
Service Maintenance Scheduled: Enterprise Database (Multiple Services Impacted) | Saturday, December 21, 2019 - 9:00am | Saturday, December 21, 2019 - 1:00pm |
Service Maintenance Scheduled: Network Switches - Building-by-Building | Monday, September 23, 2019 (All day) | Tuesday, January 28, 2020 (All day) |
The IT Security Office (ITSO) provides strategic and tactical planning for a security framework applied to both the campus and OIT environment. The ITSO provides an information risk management (IRM) function to support a secure campus IT environment including discovery and recommendation of security solutions, and developing security policies, procedures and standards. The IRM function also includes planning, oversight, and coordination for data integrity and privacy, disaster recovery, network security, incident response, and policy enforcement activities.
Know How to Stay Safe |
---|
Not only is computer security something everyone can master; it’s something anyone who uses the Internet must master. Hackers, identity thieves, scammers, and online criminals are becoming increasingly sophisticated. That means you need to be equally adept at fending them off. Use the Security Awareness website to gain the skills you need to keep your technology secure and your information safe. |
Products and Services | Features |
---|---|
Protects computers and data from malicious viruses and worms. |
|
Offers the latest news and vulnerability information for common software. |
|
highly confidential data Search Software |
Scans data for personally identifiable information. |
Mobile Device Security |
Review CU's Security Standards for Mobile devices. DDS technicians can assist you in securing any university-owned devices. To add a passcode or pin to a personally-owned mobile device, visit the manufacturer's website, or use instructions for your operating system: |
Encrypts laptops, as they can easily be lost or stolen. |
|
Alerts system administrators to unauthorized or unexpected changes to a system. |
|
Provides authentication and encryption for web-based services. |
|
Sends large files to individual users over a secure web connection. |
|
Report a Lost or Stolen Device | Report lost or stolen devices to the IT Security Office. IdentiKey login required. |
International Travel Recommendations | Guidance for protecting electronic devices and data during international travel |
Products and Services | Features |
---|---|
Informs users of IT services of their responsibilities at a campus and university level. |
|
Information and instructions on how to file a security report if your system has been compromised. |
|
I’m infected, now what? | Information and instructions if you suspect that your computer system has been infected by a virus, worm, or compromised in any way. |
Products and Services | Features |
---|---|
Identify and mitigate IT related risk. |
|
Guidance on locating and protecting data assets. |
To report SPAM or Phishing, please forward the email in question as an attachment to phish@colorado.edu or spam@colorado.edu, and include full headers in the message. Learn how to forward emails as an attachment with full headers at our Report Suspicious Messages page.
303-735-4357 (5-HELP) or help@colorado.edu
7:30 a.m. – 7:00 p.m.
University of Colorado Boulder
© Regents of the University of Colorado
Privacy • Legal & Trademarks • Campus Map