Results 21-30 of 32
Results Per Page: 
Security of Data Polity Statement In accordance with PS06.20 - Security Of Data , it is essential that Sensitive Data be protected. These terms are defined by the policy. It is very important to understand that ...
Article Id: 8037
Category: Privacy Laws & DMCA

Update Your Mac Mountain Lion OS Important Note : You must be connected to the Internet in order to update your computer. It is also recommended to connect to a power supply for all update. 1. Click on the Apple button on at the top left of the screen.
Article Id: 16984
Category: Security Software

General Information Departments on LSU's campus have to abide by LSU, State, and Federal policies and laws regarding Information Technology. It is not an easy to determine if a department is in full compliance or not. The IT Security and Policy Office can assist each department to determine the security level of their...
Article Id: 12967
Category: Security Software

IT Policy Statements: Quick Reference NOTE: This is an abbreviated list of commonly referred to Policy Statements. This is NOT a comprehensive list. For details on ALL IT Polices & Laws,...
Article Id: 10744
Category: Security Tips & Advice

Find, Copy & Paste the E-mail Message Header -- Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. All applicable e-mail headers are included in the alert sent to...
Article Id: 14922
Category: Security Tips & Advice

Article Id: 6973
Category: Security Tips & Advice

The following are some basic recommendations from LSU ITS regarding how to secure your home network. Turn On Your Firewall Firewalls can be hardware or software Hardware firewalls plug directly into your modem and can be used to protect multiple computers. These are used more frequently by businesses as opposed to those who need a solution for home use.
Article Id: 20095
Category: Security Tips & Advice

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS06.20...
Article Id: 14852
Category: Security Tips & Advice

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107
Category: Security Tips & Advice

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs...
Article Id: 16716
Category: Security Tips & Advice