Security Awareness

Last Updated: 04/09/2014

Overview

Not only is computer security something everyone can master; it’s something anyone who uses the Internet must master. Hackers, identity thieves, scammers, and online criminals are becoming increasingly sophisticated. That means you need to be equally adept at fending them off. Use this website to gain the skills you need to keep your technology secure and your information safe.

More IT security awareness and education information can be found on the University of Colorado's Office of Information Security website.

Faculty/Staff Campaign:

Academic Anonymity

Student Campaign:

Antivirus

Be Aware
Learn about these topics

Antivirus

Antivirus software is one of the most important tools for safeguarding your computer.

Browser Safety

Your web browser is your primary tool for using the Internet. It is also the number one target for cyber criminals.
Copyright & Fair Use (Information provided by UCB Libraries) Copyright infringement isn't a faceless crime.

Email & Web Security

You should be highly suspicious of unexpected messages directing you to click on a link or open an attachment, particularly if it’s from someone you don’t know.
Encryption Encryption is the transformation of information into a form that is only readable by those with particular knowledge or technology to prevent others who might have access to the information from reading it. It also serves an important role for stored information to protect it in case of loss or theft.
Ethics If you maintain your own personal integrity, you not only help our organization; you build a reputation that will reward you throughout your career.
Hardening Your Computer Hardening a computer involves several steps to form "layers" of protection. Using antivirus and antispyware protection, regularly downloading the latest manufacturers patches, and disabling unneeded software leads to safer, more secure computers.

Mobile Devices

Securing your mobile devices is like securing your computer. Lock them with a PIN or password, keep them updated and trust only expected messages.

Passwords

Simple passwords can make your life complicated. A password should not be a simple word found in a dictionary or public information such as a pet’s name or a birth date.

Phishing

Cyber criminals have learned that the easiest way to take control of your computer or steal your passwords is to simply ask you for them.
Physical Security In your exploration of IT Security, it's important to remember physical security. While not as common, physical attacks against our information can have far greater impact.
Policies & Procedures Keeping your computer software up to date isn't just a good idea, it's university policy. Learn more about how university and campus policies can protect you and campus resources.
Privacy & Identity Theft Unauthorized exposure of information such as student academic records, medical information, credit card information, and social security numbers can have a harmful effect on people's lives.

Protect Your Computer

Your computer has become a primary target for cyber criminals. Learn strategies for protecting both your work and home computers from this threat.
Social Engineering The key to protecting yourself against social engineering is to trust only communications that you initiate or you expect to receive.
Social Networking Social networking sites are powerful tools that allow you to communicate with friends and family around the world. However, be careful what you share, how you share and with whom.
Spyware Spyware is unwanted software that attaches itself to your computer, often without your knowledge, when you surf the web. It spies on you, and when it does, it noticeably bogs down and can crash your computer. Spyware can even compromise your identity.
Wireless Security Wireless is a shared medium that is broadcast via radio waves. This means that data transmitted by wireless users can be easily captured, making sensitive information (such as social security numbers and credit cards) transmitted wirelessly inherently insecure.
Working Outside the Office Technology is enabling more people to work remotely, either from home or while traveling. This provides you tremendous flexibility but also has certain risks.
You Are the Target Many people mistakenly believe that cyber criminals do not target them, that their computer or information has no value. In reality individuals like you are the cyber criminals’ primary target—you and your computer are under attack every day.