Results 21-30 of 32
Results Per Page: 
Security of Data Polity Statement In accordance with PS06.20 - Security Of Data , it is essential that Sensitive Data be protected. These terms are defined by the policy. It is very important to understand that ...
Article Id: 8037
Category: Privacy Laws & DMCA

General Information In an effort to enhance security, we recommend the following options for all students living Residential Halls, Student Apartments, or who use personal laptops that use Microsoft Windows in order to better secure their PCs: Make sure Windows Firewall is Enabled NOTE: Every...
Article Id: 14091
Category: Security Software

Update Your Mac Mountain Lion OS Important Note : You must be connected to the Internet in order to update your computer. It is also recommended to connect to a power supply for all update. 1. Click on the Apple button on at...
Article Id: 16984
Category: Security Software

General Information Departments on LSU's campus typically have to abide by LSU policies, and various State and Federal laws and regulations. Departments may also be required to comply with industry regulations (e.g., Payment Card Industry) or contractual obligations for research and/or collaboration.
Article Id: 12967
Category: Security Software

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs...
Article Id: 16716
Category: Security Tips & Advice

Find, Copy & Paste the E-mail Message Header -- Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. All applicable e-mail headers are included in the alert sent to...
Article Id: 14922
Category: Security Tips & Advice

Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS06.20...
Article Id: 14852
Category: Security Tips & Advice

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107
Category: Security Tips & Advice

The following are some basic recommendations from LSU ITS regarding how to secure your home network. Turn On Your Firewall Firewalls can be hardware or software Hardware firewalls plug directly into your modem and can be used to protect multiple computers. These are used more frequently by businesses as opposed to those who need a solution for home use.
Article Id: 20095
Category: Security Tips & Advice

IT Policy Statements: Quick Reference NOTE: This is an abbreviated list of commonly referred to Policy Statements. This is NOT a comprehensive list. For details on ALL IT Polices & Laws,...
Article Id: 10744
Category: Security Tips & Advice