Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Mission

The Computer Protection Program (CPP) administers the Laboratory's computer security program and provides the Laboratory community with technical expertise, and up-to-date information and resources for improving computer security and cyber security awareness.

Notices

  1. Mac OS X Security Recommendations
  2. Targeted Phishing Attacks
  3. Privacy Training
Section

Issues

Beginning of text...

  1. Is my network connection blocked?
  2. I think I have a virus, what should I do?
  3. Can you check my computer, it is doing something strange?
  4. My computer was lost / stolen, what do I do?
  5. How do I contact CPP?
  1. Check for network blocks
  2. Emergency
  3. Portal
Column
width60%50%
Column
width10%
Column
width30%
Section
Column
width31%
HTML
→

more... (http://#)

Column
width2%
Column
width31%

CPP Services

  1. Central System Logging
  2. One Time Passwords
  3. Computer Blocking (Computer Isolation Removal)
  4. Computer Vulnerability Scanning
HTML
→

more... (http://#)

Column
width2%
Column
width33%

Training

  1. SEC 0201 Computer Security
  2. SEC 0220 Privacy, HIPPA, & PII
HTML
→

more... (http://#)

Section Column
width31%

Policy

  1. Regulations & Procedures Manual (RPM)
  2. Minimum Computer Security
  3. Computer Protection Agreement
HTML
→

more

HTML
…
Column
width2%
Column
width31%

Intranet

  1. Computer Protection Program
  2.  
  3. Help Desk
HTML
→

more... (http://#)

Column
width2%
Column
width34%

Contact Us

CPP can be contact via the mailing list [email protected], or many common issues, such as blocked computers, can be handled by the IT Division help desk at [email protected] or x4357.
The CPP after hours emergency pager number is 510-486-7770.

more

Temporary for Design

Page Tree
expandCollapseAlltrue

...

Image Added FAQs

  1. Contact Us?
  2. Can't get online? Check onestop.lbl.gov
  3. SPAM? Report SPAM
  4. Email targeted to your UC/LBNL/DOE role?
    Forward to [email protected]


Image Added Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

Column
width50%

Image Added Resources

Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

Lost/stolen computer, phone or tablet? Report here



Image Added Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


Pop away

...