Campus and General Internal Security Measures In an effort to be more secure with our computers and sensitive information we're asking that you follow these security guidelines Internal Security Measures Reporting Incidents and Incident Response If you suspect a computer security incident Reporting Incidents Policies There are several different types of IT security documents governing and guiding how we secure our information across all of CU Policies Awareness and Education UCCS IT account owners are required to take the general UCCS on-line Information Privacy and Security course within 90 days after they receive their IT account Awareness and Education Security Training Chancellor's Memo on IT Security Training (excerpt) Security Training Copyrights Students, faculty, and staff should be aware of the implications of unauthorized downloading of copyrighted materials using University resources Copyrights How to identify a real UCCS login page One of the biggest threats that you face as owners and users of UCCS accounts is phishing emails and fake websites designed to steal your account or personal information Identify a Real UCCS Login Page Java The newest version of JAVA is 7 update 76 and 8 update 31 (January 20, 2015) Java Identify Finder Search and Remediation for Windows These instructions are for scanning your Windows computer and any attached drives for Personally Identifiable Information (PII) and remediating scan results Identify Finder Windows Identity Finder - MAC Install Identity Finder: Macintosh Identity Finder Mac
Internal Security Measures In an effort to be more secure with our computers and sensitive information we're asking that you follow these security guidelines Internal Security Measures
Reporting Incidents and Incident Response If you suspect a computer security incident Reporting Incidents
Policies There are several different types of IT security documents governing and guiding how we secure our information across all of CU Policies
Awareness and Education UCCS IT account owners are required to take the general UCCS on-line Information Privacy and Security course within 90 days after they receive their IT account Awareness and Education
Copyrights Students, faculty, and staff should be aware of the implications of unauthorized downloading of copyrighted materials using University resources Copyrights
How to identify a real UCCS login page One of the biggest threats that you face as owners and users of UCCS accounts is phishing emails and fake websites designed to steal your account or personal information Identify a Real UCCS Login Page
Identify Finder Search and Remediation for Windows These instructions are for scanning your Windows computer and any attached drives for Personally Identifiable Information (PII) and remediating scan results Identify Finder Windows