Search: 2020

Results 21 - 30 of 584

Results

Post

Remediating PII in Outlook
Information Security Procedure

Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.

PII and Outlook

In today鈥檚 evolving threat landscape, we must protect ourselves from those that would perpetrate fraud against us by constantly questioning how we store and transmit confidential information.

Post

Remediating PII in OneDrive
Information Security Procedure

Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.

This ISPR directly supports the ISBP for sharing files and folders in OneDrive.

PII and OneDrive

In today鈥檚 evolving threat landscape, we must protect ourselves from those who would perpetrate fraud against us by constantly questioning how we store and transmit confidential information.

Post

Access Control
Information Security Standard

Information Security Standards (ISS) are developed to support and enforce both District Administrative Regulations and the California Community College Information Security Standard.

I. Purpose and Scope

The objective of this Information Security Standard is to provide internal controls for access to Long Beach Community College District (LBCCD) sites, information, and applications. This Information Security Standard is part of a series of security standards governing the secure use and access of Information Technology Systems and Services.

Post

Passphrases
Office of Information Security

Why Transition to a Passphrase?

Strong passwords are an essential aspect of account security. Unfortunately, complexity requirements often lead to confusing, hard to type, and hard to remember passwords, which in turn lead users to circumvent other, important controls. Industry leaders have analyzed 100鈥檚 of millions of accounts and concluded that the practices of the past (forcing complexity, password expiration, hints, questions, etc.) have led to bad user experience and, therefore, bad behavior.

Post

Vendor Risk Management
Information Security Procedure

Information Security Procedures (ISPR) provide formal methods for which Information Security Regulations, Standards, and Best Practices are conducted.

This ISPR directly supports the Vulnerability Management Information Security Standard.

This standard is divided into the following sections: