<rss version="2.0"><channel><title>Updated Security Tips &amp; Advice Articles</title><link>https://grok.lsu.edu/</link><description>Updated Security Tips &amp; Advice articles!</description><ttl>60</ttl><item><title>Advanced: Erasing SATA Drives by using the Linux hdparm Utility</title><link>https://grok.lsu.edu/article.aspx?articleid=16716</link><description>   General Information 

 Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof.  However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) d</description><guid>16716 Mon, 23 Mar 2026 09:20:26 GMT</guid><pubDate>Mon, 23 Mar 2026 09:20:26 GMT</pubDate></item><item><title>Web Browsers: Update Browsers &amp;amp; Manage Add-ons</title><link>https://grok.lsu.edu/article.aspx?articleid=16342</link><description> Keep Web Browsers Up-to-Date 

 Most  Web Browser Updates  address  Security Vulnerabilities  and  Critical Issues  that  NEED  to be resolved.  It is   VERY IMPORTANT   that these are kept up-to-date.  These instructions will show  How to   keep your Web Browser updated . 
  

   

 1. Open</description><guid>16342 Tue, 02 Dec 2025 09:41:31 GMT</guid><pubDate>Tue, 02 Dec 2025 09:41:31 GMT</pubDate></item><item><title>Securing Your Home Network</title><link>https://grok.lsu.edu/article.aspx?articleid=20095</link><description> The following are some basic recommendations from LSU ITS regarding how to secure your home network. 

 Turn On Your Firewall 

 
	 Firewalls can be hardware or software 
	 Hardware firewalls plug directly into your modem and can be used to protect multiple computers. These are used more freq</description><guid>20095 Mon, 22 Sep 2025 07:51:31 GMT</guid><pubDate>Mon, 22 Sep 2025 07:51:31 GMT</pubDate></item><item><title>Report Phishing E-mail</title><link>https://grok.lsu.edu/article.aspx?articleid=19636</link><description>  Report Phishing E-mails  

 Phishing emails are malicious messages that attempt to trick recipients into providing sensitive information or performing fraudulent tasks. Users can report any suspicious or malicious message to LSU IT Security and Policy (ITSP) for review through the  Report  optio</description><guid>19636 Mon, 22 Sep 2025 07:50:45 GMT</guid><pubDate>Mon, 22 Sep 2025 07:50:45 GMT</pubDate></item><item><title>E-mail: Obtain the E-mail Header Message (By Client)</title><link>https://grok.lsu.edu/article.aspx?articleid=14922</link><description>  E-mail: Obtain the E-mail Headers  

 Email headers contain important diagnostic information about the route an email message takes and the results of different security and authenticity checks. 

 When reporting a message through the   Report Phishing option in Outlook  , the message and all </description><guid>14922 Thu, 28 Aug 2025 08:11:49 GMT</guid><pubDate>Thu, 28 Aug 2025 08:11:49 GMT</pubDate></item><item><title>Security Reviews: LSU Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=12967</link><description> 
 General Information 

 Departments on LSU's campus have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration.</description><guid>12967 Mon, 11 Aug 2025 11:16:43 GMT</guid><pubDate>Mon, 11 Aug 2025 11:16:43 GMT</pubDate></item><item><title>Training - Security Education and Awareness</title><link>https://grok.lsu.edu/article.aspx?articleid=12123</link><description> Promotes IT security and policy awareness through training seminars, forums, publications, notifications, articles and other instructional/informational resources. 

 
 Service Name 

 Training - Security Education and Awareness 

 Service Type 

 Service 

 Internal/External/Both 

 B</description><guid>12123 Mon, 04 Aug 2025 09:53:44 GMT</guid><pubDate>Mon, 04 Aug 2025 09:53:44 GMT</pubDate></item><item><title>Data Management: Overview</title><link>https://grok.lsu.edu/article.aspx?articleid=14852</link><description>  Data Classification  

 Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level </description><guid>14852 Tue, 22 Jul 2025 15:28:21 GMT</guid><pubDate>Tue, 22 Jul 2025 15:28:21 GMT</pubDate></item></channel></rss>