Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Computer Protection Program mission is to enable Berkeley Lab’s scientific mission by providing a secure yet open environment for Laboratory information and information systems. Our services include vulnerability scanning and remediation, intrusion detection, incident response, cyber security reviews, consultation and training.

Services

  1. One Time Passwords (OTP)
  2. LBNL Central Syslog Server (Intranet)
  3. Preventing Off-site Blocks

more

Training

  1. SEC 0201 Computer Security
  2. SEC 0220 Privacy, HIPPA, & PII
  3. PII Certification : Security 0221 (SEC0221)

more

Security Requirements

  1. Minimum Security Requirements
  2. Regulations & Procedures Manual (RPM)
  3. External and Outsourced Information Systems
  4. Passwords

more

Contact Us

For security issues, contact CPP at [email protected] (Emergency or after hours? Page (510) 486-7770)

For common issues, e.g. blocked computers, contact the Help Desk.

more

Section
Column
width55%50%

Image Added FAQs

  1. Contact Us?
  2. Can't get online? Check

Top Issues

My computer is:

Blocked from the network: Check your connection at
  1. onestop.lbl.gov
.
  • Lost or stolen: Report a lost or stolen computer.
  • I need:

    How do I Report Spam or Phishing?

    Latest News

    1. Sophos problem affecting the Lab
    2. Flashback malware affecting the Lab
    3. Vulnerable Browser Plugins
    4. Securing Home Computers
    5. Network Usage Policy
    6. Recent Targeted Phishing Attacks
    7. Computer Security Annual Refresher Training Available
    8. PII Search Tool
    9. Mac OS X Security Recommendations

    more

    Column
    width5%
     
    Column
    width40%
    1. SPAM? Report SPAM
    2. Email targeted to your UC/LBNL/DOE role?
      Forward to [email protected]


    Image Added Training

    The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

    Column
    width50%

    Image Added Resources

    Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

    Lost/stolen computer, phone or tablet? Report here



    Image Added Requirements

    The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


    metadata
    Pop away
    Pop away
    metadata
    1comment