As communicated earlier this month, we are implementing several improvements to further protect our information and technology infrastructure, including a proactive password reset for all campus account holders.
Join the virtual cybersecurity roundtable discussion at noon on Tuesday, October 15. It is a free one-hour event — all faculty, staff and students are encouraged to attend. Learn about best practices for protecting your information, identifying phishing scams, choosing secure passwords and how to stay secure while using the growing AI technologies.
The project team is excited to announce that 17 room upgrades have been completed on the CU Anschutz campus to standardize and optimize each room technology experience.
Within ISS we value our team members and the phenomenal work they do for the university. Learn more about Kevin Fotso, a bioinformatics technical analyst supporting high performance computing on the CU Anschutz campus.
AI options are constantly evolving with new options coming on the scene. While it may be exciting to try them all, it is important to keep IT security and compliance at the forefront of your mind before entering any data into an OpenAI or AI application.
The university has compiled a comprehensive list of applications and tools integral to our teaching and research endeavors. These applications and tools have been thoroughly reviewed for security vulnerabilities and classified based on the sensitivity level of the data they handle. To ensure the security and privacy of university data, it is crucial to use only approved applications and tools or submit a Technology Risk Assessment request for tools you or your department want to use to ensure the tool is reviewed and meets university security standards.
Ensuring that appropriate IT security and compliance measures are taken for everything you and your department use to conduct business. Some important questions to ask are whether all your passwords are unique and 16-characters long, or have you taken the necessary training to be up to date on regulations and IT security best practices.