Information Security and IT Compliance Services

Tools and Services 

Browse commonly used Information Security and IT Compliance (ISIC) tools and services below. The ISIC team provides several services to keep your information and the university's data safe. Services provided include monitoring, protecting and securing our information technology infrastructure, data and operations to safeguard the privacy of the university community while maintaining compliance with applicable policies, laws and regulations. 

For information technology services, visit our Information Strategy and Services partner at the Office of Information Technology (OIT) website or contact the Service Desk for additional questions. 

Compromised Email Accounts

Category: IT Security OIT - Categories Audience: Faculty Staff Students
If you believe your account has been compromised, the Security and Compliance team is available to assist. There will be an investigation into the compromised account and a process for mitigating future risk. Stop all actions and do not turn off the computer. Contact the Service Desk and report the incident.
Report Incident

If you believe your account is compromised, contact the OIT Service Desk immediately for assistance and do not turn off your computer.

You will need to report the security event to our Information Security and IT Compliance (ISIC) team for investigation. To report an incident, log into the OIT Service Center in the upper right corner. Once logged in with your university credentials, select "Make a Request." Scroll down and choose "Security Event" from the tile options. From there, several options will appear. Select the one that best matches the situation. For a compromised email account, select "Compromised Account." 

An ISIC team member will reach out to you with details regarding the results of the investigation into the security event. 

Information Security and IT Compliance

CU Anschutz

Education II North

13120 East 19th Avenue

5th Floor

Aurora, CO 80045


CMS Login