Results 31-37 of 37
Results Per Page: 
Data Classification Data at LSU can be classified into three categories (Confidential, Private or Public). Confidential data has a high level of sensitivity. Private data has a moderate level of sensitivity. Public data has a low level of sensitivity. Each category carries a different level of access and reputation risk. PS06.20...
Article Id: 14852
Category: Security Tips & Advice

General Information It is important to keep Windows files secure. These steps will show how to create and secure a Windows file share. Also, how do you do the first step for the Windows 7 & Windows 8 Operating Systems. 1. Open the Search feature by pressing "Windows + S" or by...
Article Id: 8033
Category: Security Tips & Advice

Frequently Asked Questions What are viruses? Viruses are malicious programs which when executed on a computer produce an undesired effect. While this effect may not be noticeable, often viruses delete or corrupt files and incorporate means to spread themselves. Commonly, viruses are spread through email and instant messaging...
Article Id: 137
Category: Security Tips & Advice

Federal Trade Commission Identity Theft - A Recovery Plan United States Department of Justice Identity Theft and...
Article Id: 6984
Category: Security Tips & Advice

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107
Category: Security Tips & Advice

General Information Solid State Drives (SSDs) are quickly replacing traditional, mechanical, hard disk drives due to their higher speed, lower power consumption, lighter weight, and being more shock proof. However, traditional whole disk erasing utilities like Darik's Boot and Nuke (DBAN) do not work well with SSDs...
Article Id: 16716
Category: Security Tips & Advice

Find, Copy & Paste the E-mail Message Header -- Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. All applicable e-mail headers are included in the alert sent to...
Article Id: 14922
Category: Security Tips & Advice