Best Practices

Email Security
E-mail is an important part of communication today.  However, it poses a few security risks such as phishing scams, fraudulent e-mails, and viruses. For more details please click the following link - https://www.lsu.edu/it_services/its_security/best-practices/email-security.php 

Identity Protection
Higher education has been identified as a high risk environment for data breaches and potential identity theft. Over the last few years, numerous colleges, government agencies, and corporations have had to address the aftereffects of a data breach. LSU wants to mitigate the impact of a potential breach on the LSU community. For more details please click the following link - https://www.lsu.edu/it_services/its_security/best-practices/identify-protection.php 

Listserv Usage
The following link provides guidelines for proper usage on LSU's Listserv - https://www.lsu.edu/it_services/its_security/best-practices/listserv-usage.php 

Passwords and Passphrases
What is the difference between passwords and passphrases? Passwords are typically not safe to standalone systems that expose data to enable password guessing by an attacker. Passphrases are generally stronger and much longer, making some kinds of brute force attacks entirely impractical. For more details please click the following link - https://www.lsu.edu/it_services/its_security/best-practices/passwords-passphrases.php 

Securing Systems
The following link provides a list of best practices on securing systems - https://www.lsu.edu/it_services/its_security/best-practices/securing-systems.php 

Protecting Confidential Data
The following link provides best practices on how to handle, store and dispose sensitive data - https://www.lsu.edu/it_services/its_security/best-practices/sensitive-data.php 

System Administration
The following link provides a list of best practices for servers - https://www.lsu.edu/it_services/its_security/best-practices/system-administration.php 

Wireless Security
LSU has implemented a Protected Extensible Authentication Protocol (PEAP) authentication scheme for its wireless network. Utilizing PEAP provides increased security by allowing password-based authentication to the LSU wireless network over an encrypted channel. LSU’s PEAP solution provides two methods of authentication: single sign on (SSO) and PAWS authentication. This document details the requirements for utilizing the SSO method and describes the options for users that chose not to utilize it. For more details please click the following link - https://www.lsu.edu/it_services/its_security/best-practices/wireless-security.php