Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Mission

The Computer Protection Program (CPP) administers the Laboratory's computer security program and provides the Laboratory community with technical expertise, and up-to-date information and resources for improving computer security and cyber security awareness.

Notices

  1. Mac OS X Security Recommendations
  2. Targeted Phishing Attacks
  3. Privacy Training

more

CPP Services

  1. Central System Logging
  2. One Time Passwords
  3. Computer Blocking (Computer Isolation Removal)
  4. Computer Vulnerability Scanning

more

Training

  1. SEC 0201 Computer Security
  2. SEC 0220 Privacy, HIPPA, & PII

more

Policy

  1. Regulations & Procedures Manual (RPM)
  2. Minimum Computer Security
  3. Computer Protection Agreement

more

Intranet

  1. Computer Protection Program
  2.  
  3. Help Desk

more

Contact Us

CPP can be contact via the mailing list [email protected], or many common issues, such as blocked computers, can be handled by the IT Division help desk at [email protected] or x4357.
The CPP after hours emergency pager number is 510-486-7770.

more

Section

Issues

  1. Is my network connection blocked?
  2. I think I have a virus, what should I do?
  3. Can you check my computer, it is doing something strange?
  4. My computer was lost / stolen, what do I do?
  5. How do I contact CPP?
  1. Check for network blocks at onestop
  2. Emergency
Column
width60%50%
Column
width10%
Column
width30%
Section
Column
width31%
Column
width2%
Column
width31%
Column
width2%
Column
width33%
Section
Column
width31%
Column
width2%
Column
width31%
Column
width2%
Column
width34%

Temporary for Design

Page Tree
expandCollapseAlltrue

...

Image Added FAQs

  1. Contact Us?
  2. Can't get online? Check onestop.lbl.gov
  3. SPAM? Report SPAM
  4. Email targeted to your UC/LBNL/DOE role?
    Forward to [email protected]


Image Added Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

Column
width50%

Image Added Resources

Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

Lost/stolen computer, phone or tablet? Report here



Image Added Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


Pop away

...