Training Opportunities
Regularly scheduled training is provided via HROD’s Technical and Professional Training.
Book TrainingBreach Protocol
When a breach is identified, the LU IT Breach Protocol is undertaken. A security breach is an incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so.
Breach ProtocolImportant Policies
Password Policy
Laurentian University recognizes that to best protect your accounts from unauthorized attacks, a password must be strong and must be changed regularly. The policy on passwords will enforce a minimum requirement of length and characters in addition to the frequency of password changes, to ensure the most secure account
View Policy
Acceptable Use Policy
This Policy is intended to govern the use of Laurentian University’s electronic services, and to provide clear definition of what constitutes improper use of Laurentian University’s electronic services.
View PolicyPolicy on Access General and Confidential Information
This policy serves to stipulate, clarify and outline authorized electronic access for administrators, faculty, staff, students, contractors and volunteers so as to effectively manage and reduce the risk of unauthorized electronic access to and use of personal information in order to comply with the Freedom of Information and Protection of Privacy Act.
View Policy
Policy on Managing Confidential Digital Information
The policy serves to protect the confidentiality, integrity and availability of digital confidential information and stipulate, clarify and outline authorized digital storage and transmission method of data.
View PolicySecurity Blogs
KnowBe4
KnowBe4 provides Security Awareness Training to help you manage the IT security problems of social engineering, spear phishing and ransomware attacks.
Go To Website
Krebs on Security
Former Washington Post staffer Brian Krebs writes on cyber crime and other Internetsecurity topics.
Go To WebsiteCIO Security
Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.
CIO Security
Government of Canada
Government of Canada Get Cyber Safe campaign. Find out where the risks are, how to protect yourself and how to protect your devices.
Government of CanadaDarkReading
Cyber security’s comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
DarkReading