Results 21-30 of 34
Results Per Page: 

Security of Data Polity Statement In accordance with PS06.20 - Security Of Data , it is essential that Sensitive Data be protected. These terms are defined by the policy. It is very important to understand that ...
Article Id: 8037
Category: Privacy Laws & DMCA

Update Your Mac Mountain Lion OS Important Note : You must be connected to the Internet in order to update your computer. It is also recommended to connect to a power supply for all update. 1. Click on the Apple button on at the top left of the screen.
Article Id: 16984
Category: Security Software

General Information Departments on LSU's campus have to abide by LSU, State, and Federal policies and laws regarding Information Technology. It is not an easy to determine if a department is in full compliance or not. The IT Security and Policy Office can assist each department to determine the security level of their...
Article Id: 12967
Category: Security Software

Keep Web Browsers Up-to-Date Most Web Browser Updates address Security Vulnerabilities and Critical Issues that NEED to be resolved. It is VERY IMPORTANT that these are kept up-to-date. These instructions will show How...
Article Id: 16342
Category: Security Tips & Advice

Frequently Asked Questions What are viruses? Viruses are malicious programs which when executed on a computer produce an undesired effect. While this effect may not be noticeable, often viruses delete or corrupt files and incorporate means to spread themselves. Commonly, viruses are spread through email and instant messaging...
Article Id: 137
Category: Security Tips & Advice

IT Policy Statements: Quick Reference NOTE: This is an abbreviated list of commonly referred to Policy Statements. This is NOT a comprehensive list. For details on ALL IT Polices & Laws,...
Article Id: 10744
Category: Security Tips & Advice

Find, Copy & Paste the E-mail Message Header -- Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. All applicable e-mail headers are included in the alert sent to...
Article Id: 14922
Category: Security Tips & Advice

Article Id: 6973
Category: Security Tips & Advice

Article Id: 6984
Category: Security Tips & Advice