Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Mission

The Computer Protection Program (CPP) administers the Laboratory's computer security program and provides the Laboratory community with technical expertise, and up-to-date information and resources for improving computer security and cyber security awareness.

With the launch of our new site on commons, we would love to hear from you. Click on feedback to let us know what you think.

Issues

  1. Is my network connection blocked?
  2. How do I Request a Scan?
  3. How do I report Spam, Phishing, and Hoaxes?
  4. My computer was lost / stolen, what do I do?
  5. How to Protect Your Laptop from Theft?

Latest News

  • Mac OS X Security Recommendations
  • Reporting SPAM, Phishing and …
  • PII Search Tool
  • more

    CPP Services

    1. One Time Passwords
    2. Mac Security Guide
    3. Computer Scanning

    more

    Training

    1. SEC 0201 Computer Security
    2. SEC 0220 Privacy, HIPPA, & PII
    3. PII Certification : Security 0221 (SEC0221)

    more

    Policy

    1. Regulations & Procedures Manual (RPM)
    2. Minimum Computer Security
    3. Computer Protection Agreement

    more

    Security Software

    1. Sophos Antivirus
    Go to to get your software.

    Policy

    1. Regulations & Procedures Manual (RPM)
    2. Minimum Computer Security
    3. Computer Protection Agreement

    more

    Contact Us

    CPP can be contact via the mailing list [email protected], or many common issues, such as blocked computers, can be handled by the IT Division help desk at [email protected] or x4357.
    The CPP after hours emergency pager number is 510-486-7770.

    more

    Section

    Issues

    1. Is my network connection blocked?
    2. How do I Request a Scan?
    3. How do I report Spam, Phishing, and Hoaxes?
    4. My computer was lost / stolen, what do I do?
    5. How to Protect Your Laptop from Theft?
    http://
  • onestop.lbl.gov
  • /onestop/
  • Feedback
  • Column
    width55%50%
    Column
    width2%
    Column
    width43%

    Image Added FAQs

    1. Contact Us?
    2. Can't get online? Check
    1. Emergency Contacts
    Link in New Window
    toolbartrue
    width800
    iconfalse
    href
    typepopup
    height600
    Link in New Window
    http://help.lbl.govhttp://help.lbl.gov
    iconfalse
    Link in New Window
    https://software.lbl.gov/https://software.lbl.gov/
    iconfalse
    Section
    Column
    width31%
    Column
    width2%
    Column
    width31%
    Link in New Window
    http://www.lbl.gov/Disclaimers.htmlhttp://www.lbl.gov/Disclaimers.html
    iconfalse
    Column
    width2%
    Column
    width33%
    Section
    Column
    width31%
    Link in New Window
    https://software.lbl.gov/https://software.lbl.gov/
    iconfalse
    Column
    width2%
    Column
    width31%
    Column
    width2%
    Column
    width34%

    Temporary for Design

    Page Tree
    expandCollapseAlltrue

    ...

    1. SPAM? Report SPAM
    2. Email targeted to your UC/LBNL/DOE role?
      Forward to [email protected]


    Image Added Training

    The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

    Column
    width50%

    Image Added Resources

    Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

    Lost/stolen computer, phone or tablet? Report here



    Image Added Requirements

    The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


    Pop away

    ...