IT Security

Last Updated: 07/05/2018


The IT Security Office (ITSO) provides strategic and tactical planning for a security framework applied to both the campus and OIT environment. The ITSO provides an information risk management (IRM) function to support a secure campus IT environment including discovery and recommendation of security solutions, and developing security policies, procedures and standards. The IRM function also includes planning, oversight, and coordination for data integrity and privacy, disaster recovery, network security, incident response, and policy enforcement activities.

Security Awareness

Know How to Stay Safe
Not only is computer security something everyone can master; it’s something anyone who uses the Internet must master. Hackers, identity thieves, scammers, and online criminals are becoming increasingly sophisticated. That means you need to be equally adept at fending them off. Use the Security Awareness website to gain the skills you need to keep your technology secure and your information safe.

Stay Secure

Products and Services Features


Protects computers and data from malicious viruses and worms.

Security Alerts & News

Offers the latest news and vulnerability information for common software.

highly confidential data Search Software

Scans data for personally identifiable information.

Mobile Device Security

Review CU's Security Standards for Mobile devicesDDS technicians can assist you in securing any university-owned devices. To add a passcode or pin to a personally-owned mobile device, visit the manufacturer's website, or use instructions for your operating system:  

PGP Encryption Software

Encrypts laptops, as they can easily be lost or stolen.

Host-based Intrusion Detection Software (HIDS)

Alerts system administrators to unauthorized or unexpected changes to a system.

SSL Site Certificates

Provides authentication and encryption for web-based services.

Large File Transfer

Sends large files to individual users over a secure web connection.

Report a Lost or Stolen Device Report lost or stolen devices to the IT Security Office. IdentiKey login required.
International Travel Recommendations Guidance for protecting electronic devices and data during international travel

Policies and Procedures

Products and Services Features


Informs users of IT services of their responsibilities at a campus and university level.

Report an incident 

Information and instructions on how to file a security report if your system has been compromised.

I’m infected, now what? Information and instructions if you suspect that your computer system has been infected by a virus, worm, or compromised in any way.

Information Risk Management

Products and Services Features

Risk Assessment

Identify and mitigate IT related risk.

Data Asset Inventory

Guidance on locating and protecting data assets.

Still need help?

To report SPAM or Phishing, please forward the email in question as an attachment to or, and include full headers in the message. Learn how to forward emails as an attachment with full headers at our Report Suspicious Messages page.

Related Resources