Viewable by the world

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 378 Next »

FAQs

  1. Contact Us?
  2. Can't get online? Check onestop.lbl.gov
  3. SPAM? Report SPAM
  4. Email targeted to your UC/LBNL/DOE role?
    Forward to [email protected]



Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

Resources

Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

Lost/stolen computer, phone or tablet? Report here


 Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.

Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

 Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


  • No labels