results for "lsu"
Results 1-8 of 8
Results Per Page: 
General Information Departments on LSU's campus have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration. There are various challenges that may be encountered while determining the level of...
Article Id: 12967

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention. The application is implemented with the University's Office365...
Article Id: 19636

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS-124 Data Management outlines the security of data at LSU.
Article Id: 14852

When reporting a suspicious e-mail or a potential phishing attempt to ITS, please include the Message Header. The Message Header contains helpful information which can assist e-mail administrators in troubleshooting. Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP...
Article Id: 14922

Promotes IT security and policy awareness through training seminars, forums, publications, notifications, articles and other instructional/informational resources. Service Name Training - Security Education and Awareness Service Type Service Internal/External/Both Both Aliases training, outreach, alerts, education Description Promotes IT...
Article Id: 12123

The following are some basic recommendations from LSU ITS regarding how to secure your home network. Turn On Your Firewall Firewalls can be hardware or software Hardware firewalls plug directly into your modem and can be used to protect multiple computers. These are used more frequently by businesses as opposed to those who need a solution for home use. Software firewalls...
Article Id: 20095

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs because the placement of data blocks is not as predictable as...
Article Id: 16716

Provide Search Feedback Logo
Search Google Logo