Training

Training can be provided on demand from IT to a group.

Training Opportunities

Regularly scheduled training is provided via HROD’s Technical and Professional Training.

Book Training

Breach Protocol

When a breach is identified, the LU IT Breach Protocol is undertaken. A security breach is an incident in which sensitive, protected, or confidential data has potentially been viewed, stolen, or used by an individual unauthorized to do so.

Breach Protocol

Important Policies

Password Policy

Laurentian University recognizes that to best protect your accounts from unauthorized attacks, a password must be strong and must be changed regularly. The policy on passwords will enforce a minimum requirement of length and characters in addition to the frequency of password changes, to ensure the most secure account

View Policy

 

Acceptable Use Policy

This Policy is intended to govern the use of Laurentian University’s electronic services, and to provide clear definition of what constitutes improper use of Laurentian University’s electronic services.

View Policy
Policy on Access General and Confidential Information

This policy serves to stipulate, clarify and outline authorized electronic access for administrators, faculty, staff, students, contractors and volunteers so as to effectively manage and reduce the risk of unauthorized electronic access to and use of personal information in order to comply with the Freedom of Information and Protection of Privacy Act.

View Policy

 

Policy on Managing Confidential Digital Information

The policy serves to protect the confidentiality, integrity and availability of digital confidential information and stipulate, clarify and outline authorized digital storage and transmission method of data.

View Policy

Security Blogs

KnowBe4

KnowBe4 provides Security Awareness Training to help you manage the IT security problems of social engineering, spear phishing and ransomware attacks.

Go To Website

 

Krebs on Security

Former Washington Post staffer Brian Krebs writes on cyber crime and other Internetsecurity topics.

Go To Website
CIO Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands including, Norton, PC Tools, ZoneAlarm and AVG.

CIO Security

 

Government of Canada

Government of Canada Get Cyber Safe campaign. Find out where the risks are, how to protect yourself and how to protect your devices.

Government of Canada
DarkReading

Cyber security’s comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.

DarkReading

When in doubt, contact IT.