Blog Post

Our People: Rus Pascual

Rus Pascual and his wife were looking for something more than the city life they had come to know in Chicago, where they had been their whole lives. They weren’t sure what that meant at first, but it clicked when they visited Colorado—friendly and welcoming people, eclectic communities, and of course, the humbling beauty of the mountains.

You Have the Power to Take Control of Your Data (for the Most Part)

Have you thought about your online data recently? We’re talking about data that includes your interests and purchases to your online behavior, which is collected by websites, apps, devices, services and companies from all around the world. This data can also include information about your physical self, like health data. Think about your smartwatch, which tracks, stores and transmits complex data about you as the wearer, including your steps taken in a day, body composition and possibly even spotting potential medical conditions. Own a Smart TV or a Smart Appliance?

How to Prepare for and Respond to a Ransomware Incident

On Oct. 11, the U.S. Secret Service, FBI Denver Cyber Task Force, Cybersecurity and Infrastructure Security Agency (CISA), Boulder County Chief Information Security Office and the Governor’s Office of Information Technology (OIT) gathered to talk about cybersecurity and ransomware. Here, we share some of that discussion so you can be ready if you run into a ransomware attack at work.

5 Easy Habits to be Cyber Safe

According to the National Cybersecurity Alliance (NCA), one in three people often feel overwhelmed by cybersecurity information. And it's no wonder. With cybercrime on the rise, it can be intimidating trying to understand how to keep our online accounts secure. Held every October, Cybersecurity Awareness Month is a collaboration between government entities and the private sector to empower everyone to protect their personal data from digital crimes. Since more than 93% of us are online at least once a day, educating ourselves on good cyber behaviors and putting them into practice is our best bet to staying safe online both at work and at home.

Special Event: Cybersecurity Awareness Month Expert Panel on Ransomware

Attend in person or virtually!

What: Join the Governor’s Office of Information Technology (OIT) for this special event in celebration of the 20th annual Cybersecurity Awareness Month. Hear from experts from the U.S. Secret Service, FBI Denver Cyber Task Force, Cybersecurity and Infrastructure Security Agency (CISA), Boulder County Chief Information Security Office and OIT about ransomware and what can be done before and after an incident.

How does keyboard testing work and why is it important?

Keyboard accessibility is one of the most important components of web accessibility because many users with disabilities use keyboards instead of a mouse. For example, those with motor disabilities rely on keyboards as their primary input device, and those users who are blind or have low vision often use keyboards for navigation and application shortcut functionality.

But how do you know if a website or application is operable through a keyboard?

Celebrating 15 years as the state's IT partner!

Did you know that 15 years ago OIT became what it is today? When OIT was created in 1999 as the Governor’s Office of Innovation and Technology (and later renamed the Governor’s Office of Information Technology in July 2006) to serve as an advisory organization, executive branch agencies managed their own IT services. The result included duplicative systems and the inability to leverage statewide procurement opportunities, among other things.

How does keyboard testing work and why is it important?

Keyboard accessibility is one of the most important components of web accessibility because many users with disabilities use keyboards instead of a mouse. For example, those with motor disabilities rely on keyboards as their primary input device, and those users who are blind or have low vision often use keyboards for navigation and application shortcut functionality.

Ready to unplug this summer with some travel? Be careful where you plug in

Free, public phone charging stations are everywhere these days as a convenient solution to a low phone battery while we’re on the go. But cybercriminals are smartening up and have learned how to steal your data while you’re powering up. This hacking trend is called “juice jacking,” according to the Federal Communications Commission (FCC). “Malware installed through a corrupted USB port can lock a device or export personal data and passwords directly to the perpetrator,” the FCC warned in a recent alert.
#FFFFFF

OIT Logo

Contact

Governor’s Office of
Information Technology 

1575 Sherman Street
Denver, CO 80203

303.764.7700

oit@state.co.us

Report a Security Incident

Quick Links

Colorado Open Records (CORA) Request

Accessibility Statement

Site Map

Colorado Information Marketplace

Service Catalog