Technology News & Initiatives

Search

Filter results by:

IT Security Awareness & Action

Search

Filter results by:

  • Beware of Coloradowide Scam Targeting License Holders

    Apr 30, 2024
    The Division of Professions and Occupations has identified a statewide scam that is targeting licensed professionals. Learn more on how to protect yourself from this scam.
    Full story
  • App Assessment Process

    Apr 30, 2024
    To successfully make a software or hardware purchase, you will want to plan ahead to ensure you have a seamless compliance review and a successful purchase through Marketplace. Here is the process for an application security review.
    Full story
  • Windows 11 Transition

    Apr 30, 2024
    The world and the university are transitioning to Windows 11 in the next 18 months. Microsoft has designated October 14, 2025 as the last day of support for Windows 10. Learn more about the universitywide transition to prepare for this change.
    Full story
  • Microsoft 365 Copilot Chat Security

    Feb 14, 2024
    Microsoft Copilot is an AI tool that can help you save time and improve productivity and is now approved for use through our university licensing. Copilot combines the generative AI capabilities of Bing Chat with commercial data protection. This means user and business data is protected and will not leak outside of our organization, prompts and responses are not saved, no one at Microsoft can view chats, and data is not used to train the underlying large language model (LLM).
    Full story
  • New Way to Report Phishing Using Your Mobile Phone

    Feb 14, 2024
    The university has seen an increase in smishing and phishing attempts. Reporting suspicious emails and text messages is easier than ever from both your computer and your phone. To report a suspicious email to be reviewed by one of our security experts, follow these directions on our website.
    Full story
  • Tips for Recognizing and Preventing a Cyber Attack

    Feb 14, 2024
    Cybercriminals have many ways of infiltrating our systems, and while that makes us uneasy, there are ways to recognize and prevent attacks from happening. This article includes tips on how you can prevent and recognize when a malicious actor has obtained access or information from your systems.
    Full story
  • Showing 37 - 42 of 58 results
CMS Login