Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Computer Protection Program mission is to enable Berkeley Lab’s scientific mission by providing a secure yet open environment for Laboratory information and information systems. Our services include vulnerability scanning and remediation, intrusion detection, incident response, cyber security reviews, consultation and training.

Section
  • Flashback malware affecting the Lab
  • Vulnerable Browser Plugins
  • Securing Home Computers
  • Network Usage Policy
  • Recent Targeted Phishing Attacks
  • Computer Security Annual Refresher Training Available
  • PII Search Tool
  • Mac OS X Security Recommendations
  • more

    Services

    1. One Time Passwords (OTP)
    2. LBNL Central Syslog Server (Intranet)
    3. Preventing Off-site Blocks

    more

    Training

    1. SEC 0201 Computer Security
    2. SEC 0220 Privacy, HIPPA, & PII
    3. PII Certification : Security 0221 (SEC0221)

    more

    Security Requirements

    1. Minimum Security Requirements
    2. Regulations & Procedures Manual (RPM)
    3. External and Outsourced Information Systems
    4. Passwords

    more

    Contact Us

    For security issues, contact CPP at [email protected] (Emergency or after hours? Page (510) 486-7770)

    For common issues, e.g. blocked computers, contact the Help Desk.

    more

    Column
    width55%50%

    Image Added FAQs

    1. Contact Us?
    2. Can't get online? Check

    Top Issues

    My computer is:

    Blocked from the network: Check your connection at
    1. onestop.lbl.gov
    .
  • Lost or stolen: Report a lost or stolen computer.
  • I need:

    How do I Report Spam or Phishing?

    Latest News

    [Sophos problem affecting the Lab, fix available here
    Warning
    Column
    width5%
    Column
    width40%

    ...

    1. SPAM? Report SPAM
    2. Email targeted to your UC/LBNL/DOE role?
      Forward to [email protected]


    Image Added Training

    The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

    Column
    width50%

    Image Added Resources

    Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

    Lost/stolen computer, phone or tablet? Report here



    Image Added Requirements

    The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


    Pop away

    ...