Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Mission

The Computer Protection Program (CPP) administers the Laboratory's computer security program and provides the Laboratory community with technical expertise, and up-to-date information and resources for improving computer security and cyber security awareness.

Section

Top Issues

Beginning of text...

  1. Is my network connection blocked?
  2. I think I have a virus, what should I do?
  3. Can you check my computer, it is doing something strange?
  4. My computer was lost / stolen, what do I do?
  5. How do I contact CPP?
Column
width60%50%
Column
width10%
Column
width30%
HTML
<a href="http://onestop.lbl.gov/onestop/" title="Onestop" target="new">Onestop</a>
  • Emergency
  • Portal
  • Section Column
    width31%

    Notices (http://#)

  • HTML
    <a href="https://commons.lbl.gov/x/1ob_Ag" target="new">Mac OS X Security Recommendations</a>
  • Link to Locationpagepage1link:https://commons.lbl.gov/x/1ob_Ag
  • Targeted Phishing Attacks
  • Privacy Training
  • HTML
    &#8594;

    more... (http://#)

    Column
    width2%
    Column
    width31%

    CPP Services (http://#)

    1. Central System Logging
    2. One Time Passwords
    3. Computer Blocking (Computer Isolation Removal)
    4. Computer Vulnerability Scanning
    5. Certificates (SSL)
    6. Cyber Incident Handling
    7. Cyber Intrusion Detection
    8. Firewalls
    9. Security Education, Training
    10. Security Evaluations and Consulting Services
    HTML
    &#8594;

    more... (http://#)

    Column
    width2%
    Column
    width33%

    Training (http://#)

    1. SEC 0201 Computer Security
    2. SEC 0220 Privacy, HIPPA, & PII
    HTML
    &#8594;

    more... (http://#)

    Section Column
    width31%

    Policy (http://#)

    1. Regulations & Procedures Manual (RPM)
    2. Minimum Computer Security
    3. Computer Protection Agreement
    HTML
    &#8594;

    more... (http://#)

    Column
    width2%
    Column
    width31%

    Contact Us (http://#)

    1. Emergency
    2. [email protected]
    3. CPIC
    4. Computer Security Liaison
    5. Comments / Recommendations
    HTML
    &#8594;

    more... (http://#)

    Column
    width2%
    Column
    width34%

    Portal (http://#)

  • Computer Protection Program
  • Help Desk
  • HTML
    &#8594;

    more... (http://#)

    Section
    Column
    width60%

    To help you on your way, we've inserted some of our favourite macros on this home page. As you start creating pages, adding news items and commenting you'll see the macros below fill up with all the activity in your space.
    What I want the link to be called

    ...

    Image Added FAQs

    1. Contact Us?
    2. Can't get online? Check onestop.lbl.gov
    3. SPAM? Report SPAM
    4. Email targeted to your UC/LBNL/DOE role?
      Forward to [email protected]


    Image Added Training

    The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

    Column
    width50%

    Image Added Resources

    Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

    Lost/stolen computer, phone or tablet? Report here



    Image Added Requirements

    The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


    Pop away

    ...