OIT is thrilled to announce that as of July 2023, our classroom technology upgrades are underway with the first few classroom transformations completed. The new technology offers a simplified experience with quick setup and a user-friendly interface.
Primary security concerns with AI at the university include attackers deliberately injecting false information to compromise the integrity of data in machine learning mode and uploading data into AI where is may remain permanently without appropriate university approved protections and security controls.
Our new service desk support model includes a more streamlined process, quicker response times and more personalized assistance. If you need technical assistance while in a classroom or conference room, please call 303-724-4357 or 4-HELP.
OIT has been working with the School of Medicine (SOM) and the CU Boulder Research Computing team (CURC) to create a shared HPC resource for researchers on the CU Anschutz campus. Interested in more information about high performance computing with Alpine? The team can attend your department meeting to discuss more about the system’s capabilities and processes to get started. A Microsoft Teams community site has been created for active HPC users to share best practices, resources, and peer-to-peer support. More information about the new Alpine HPC is available on the OIT HPC webpage at cuanschutz.edu/hpc or email questions to the HPC team at [email protected].
It is that time of year - be sure you are vigilant in being aware of holidays scams. Do your research before you donate to charities, be on the look out for phishing emails, protect your credit card data.
It is more important than ever to protect data - research data and other sensitive data in particular - must be protected in accordance with data classification requirements. Learn more about implementing simple measures to help protect research participants' information and the university.
Social Engineering can take on many forms. One of them we are all too familiar with is phishing. Other examples might include baiting, pretexting, tailgating, and honeytraps. These tactics are well rehearsed and executed, so if you find yourself in a situation where you believe you are being targeted by social engineering, take a deep breath, and think before you act.
Software updates fix security flaws that malware and hackers try to leverage to gain unauthorized access to your data. To protect your data, keep automatic updates on as well as those popups that apply patches to outdated systems.
Microsoft Defender for Endpoint runs behind the scenes and is designed to have minimal impact to your workflow by running in the background and only alerting you when a risk is present. Installation of Microsoft Defender on university-owned devices is an additional step in a series of actions that has been taken to help protect our campuses from cybercriminal activity.
There are a number of resources available to help protect sensitive information that may have been obtained during a data breach. Learn more about reporting a security incident and ways to protect your identity.