Technology News & Initiatives

  • CU Denver | Anschutz, Information Strategy and Services.

    Introducing Information Strategy and Services

    Jan 21, 2026
    Information Strategy and Services (ISS) serves both the CU Anschutz and CU Denver campuses and encompasses the units previously identified as the Office of Information Technology (OIT); Information Security and IT Compliance (ISIC); and Information, Data Enablement and Assurance (IDEA). With the launch of the CU Anschutz rebranding effort, we seized the opportunity to update our identity to simplify and strengthen our connection with the university community. Over the course of 2026, we will be removing our individual unit names (OIT, ISIC, IDEA) and will be one ISS.
    Full story

Reminders and Updates for Researchers

IT Security Awareness & Action

Search

Filter results by:

  • Graphic of a presenter and adult students with Online Course: Security Awareness Course Requirement.

    Restart Information Security Awareness Course in Percipio

    Dec 17, 2025
    While technology helps us accomplish a lot in our day-to-day lives, sometimes it is nuanced and can be challenging to navigate. Percipio has a known issue when retaking a course. To retake a course, you will need to follow the steps below in order for it to accurately track your latest attempt. If the date isn’t updated properly, Percipio doesn’t give you credit for retaking the course and it will continue to show that you are out of compliance with your university-required training. New hires will follow the normal process to launch the course for the first time in Percipio, but current employees will need to follow different steps to retake the course.
    Full story
  • Image of a person in a holiday sweater making an online purchase with a credit card.

    Shopping Scams – Use Procurement Best Practices

    Dec 17, 2025
    To protect university information and secure your purchases, it’s always important to follow Procurement Service Center purchasing guidelines and best practices. CU Marketplace is the university’s official procurement system. For all university purchases, you should go through the CU Marketplace with your university account. Approved vendors within CU Marketplace may be running sales that you can take advantage of and accessing them through the Marketplace guarantees that you are accessing them through a secure and valid link.
    Full story
  • Graphic of a cybercriminal targeting different generations Boomer, X, Y, and Z.

    Cybersecurity and Different Generations

    Oct 28, 2025
    A recent Cybersecurity Awareness Month study completed by SANS Institute for Cybersecurity Training and Degrees revealed that different generations face different risks online and are more susceptible to certain types of cyberthreats. Read for best practices to use to protect your data at work and at home.
    Full story
  • DUO logo

    Multi-Factor Authentication (MFA) Fatigue

    Oct 28, 2025
    Cybercriminals may make repeated MFA requests, sometimes with many requests in a very short period of time, which is known as an MFA (Duo) Fatigue Attack.  The malicious actor is hoping you will hit “Approve” just to make the alerts go away. Don’t fall for this tactic, never hit “Approve” unless it’s you; call the Service Desk for immediate help if you experience this. 
    Full story
  • Image of a circuit board with AI under a magnifying glass.

    Using AI: Think Before You Act

    Oct 28, 2025
    Artificial Intelligence (AI) is the latest tool to enhance the way you do your work. As with any tool, it is important to use it wisely and be aware of limitations and security risks. Before using any AI platform, either at the university or at home—be mindful of using it with the following types of information: Confidential data, be aware of hallucinations, and medical or diagnostic questions. When using AI with your work for the university, be sure to use one of the university-approved AI tools that has already been assessed for risk and compliance.
    Full story
  • graphic of three envelopes. Two are red with phishing and spam, one is blue for normal.

    Spam vs Phishing

    Aug 19, 2025
    With all the methods bad actors use to try and gain access to your information, it can be challenging to tell the difference between spam or phishing. Reporting is what is most important, so if you identify spam or phishing report it using the built-in "Report" button along the top toolbar; the "Report Message" add-in; or you can right-click the message, hover over "Report" and choose "Junk" or "Phishing."  
    Full story
  • Showing 1 - 6 of 58 results
CMS Login