Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Section
Column
width50%

...

Image Added FAQs

  1. Contact Us?
  2. Can't get online? Check onestop.lbl.gov
  3. SPAM? Report SPAM
  4. Email targeted to your UC/LBNL/DOE role?
    Forward to [email protected]

...


Image Added Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

Column
width50%

Image Added Resources

Need help protecting your computer or server? Need

...

a password manager? View our list of Cyber Security Resources.

...

Column
width50%

Image Removed Training

The Computer Protection Program sets minimum cyber security training requirements, which are tracked through the JHA system.

...

Lost/stolen computer, phone or tablet? Report here



Image Added Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.

...


Pop away