Compromised Email Accounts

Cost: Free
If you believe your account has been compromised, the Security and Compliance team is available to assist. There will be an investigation into the compromised account and a process for mitigating future risk. Stop all actions and do not turn off the computer. Contact the Service Desk and report the incident.
See full details Report Incident

Credit Card Merchant Accounts - PCI DSS Compliance

Cost: Free
A payment card is any type of credit, debit or prepaid card used in a financial transaction. Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is required of all university departments that accept payment cards for financial transactions. Any third-party vendor engaged by University Merchants to process payment card transactions on their behalf, or who is engaged in payment card financial services on our campus, must also comply with the PCI DSS.
See full details Request Assistance

Data Access Requests

Cost: Free
Data access requests can be made with appropriate permissions from data owners and initiated by the supervisor of the person in question, or by the department administrator.
See full details

Firewall Security Services

Cost: Free
In order to make your server accessible from the Internet, or from any of the affiliate networks, please complete a Firewall Penetration Request and remediate any vulnerabilities or configuration changes that are identified during the penetration request process.
See full details Request Exception

Lost and Stolen Devices

Cost: Free
If a university owned and issued electronic device has been lost or stolen, learn how to report the missing item.
See full details

Microsoft Defender for Endpoint Antivirus

Cost: Free
Microsoft Defender for Endpoint is a modern endpoint security platform for university owned devices. Microsoft Defender for Endpoint identifies software vulnerabilities, provides antivirus and anti-phishing protection, and detects threats in a single, unified platform. The platform integrates with Microsoft 365 services such as Outlook, SharePoint and OneDrive, offering robust security.
See full details Security Best Practices

Phishing Emails

Cost: Free
Phishing is a psychological attack used by cyber criminals to trick you into giving up information or taking an action. Learn more about recognizing phishing attempts.
See full details

Remote Access VPN

Cost: Free
When connecting from off-campus, there are several remote options based on your needs. You will be prompted for multi-factor authentication through Duo during login to the VPN or VMware Horizon for remote access.
See full details

Technology Risk Assessment

Cost: Free
The Risk and Compliance team reviews the security and practices of third party applications, cloud services and business processes in order to protect university confidential and highly confidential data, including PHI, to reduce risk and meet compliance standards.
See full details Request Technology Risk Assessment

Timely Terminations

Cost: Free
There is a standard process in place for typical terminations from the university. Timely terminations are specific to an involuntary termination or any circumstance where the unit believes there is a risk to university data. ISIC will evaluate the request and then obtain approval from Legal and HR before disabling access. Please note that employees who also hold an active role as a student have specific rights to maintain access to their student account.
Request Assistance

Information Security and IT Compliance

CU Anschutz

Education II North

13120 East 19th Avenue

5th Floor

Aurora, CO 80045


CMS Login