Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

(i)Page best viewed with Firefox, Chrome, and IE8+

Mission

The Computer Protection Program (CPP) administers the Laboratory's computer security program and provides the Laboratory community with technical expertise, and up-to-date information and resources for improving computer security and cyber security awareness.

Notices

Connecting the LBNL Network, Employee, Computer Use, etc.

  1. Regulations and Procedures Manual (RPM)
  2. Minimum Computer Security
  3. Lorem ipsum

CPP Services

  1. Regulations and Procedures Manual (RPM)
  2. Minimum Computer Security
  3. Lorem ipsum

Training

  1. Minimum Computer Security
  2. Lorem ipsum

Policy

Contact Us

Portal

  1. Computer Protection Program
  2. Emergency
  3. Help Desk
Section

Top Issues

Beginning of text...

  1. Is my network connection blocked?
  2. I think I have a virus, what should I do?
  3. Can you check my computer, it is doing something strange?
  4. My computer was lost / stolen, what do I do?
  5. How do I contact CPP?
<a href="http://
  • onestop.lbl.gov
  • /onestop/" target="new">Onestop</a>
  • Emergency
  • Site Map
  • Intranet
  • Column
    width60%50%
    Column
    width10%
    Column
    width30%

    Image Added FAQs

    1. Contact Us?
    2. Can't get online? Check
      HTML
      Section
      Column
      width31%
      Column
      width2%
      Column
      width31%
      Column
      width2%
      Column
      width33%
      Section
      Column
      width31%
      Column
      width2%
      Column
      width31%
      Column
      width2%
      Column
      width34%
      Section
      Column
      width60%

      To help you on your way, we've inserted some of our favourite macros on this home page. As you start creating pages, adding news items and commenting you'll see the macros below fill up with all the activity in your space.
      What I want the link to be called

      ...

      1. SPAM? Report SPAM
      2. Email targeted to your UC/LBNL/DOE role?
        Forward to [email protected]


      Image Added Training

      The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

      Column
      width50%

      Image Added Resources

      Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

      Lost/stolen computer, phone or tablet? Report here



      Image Added Requirements

      The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


      Pop away

      ...