locks floating
Cybersecurity

SLAC Cybersecurity's mission is to protect the laboratory’s information resources and enable the laboratory to leverage the best technology while empowering science.

Report Incident

Cybersecurity

Lines of Effort

Our Work

The SLAC cybersecurity team leads and manages efforts to ensure the confidentiality, availability, and integrity of SLAC information technology systems and data through appropriate security resources and best practices.

Cybersecurity Initiatives

Projects

Cybersecurity plays a vital role in protecting the confidentiality, integrity, and availability of information at SLAC.  Check out a some of our major initiatives.

Support

Contact the Cyber Team

Need help? We're here.

All Frequently Asked Questions (SLAC Login Required)

SLAC is a part of the Department of Energy national laboratory system, and is subject to the mandates, requirements and regulations on federal agencies.  As such, the security requirements apply to all SLAC systems, including those associated with open science.

The SLAC CyberSecurity Team goes to significant lengths to tailor the approach to information security in a manner to minimize the impact to science and your ability to complete your job responsibilities. If you believe that there is an issue where you are being blocked by security practices or tooling, please reach out to the CyberSecurity team for a consultation and we can discuss the particulars. It is quite possible that the issue is not CyberSecurity related at all.

Security is a journey, not a destination. Each step improves our ability to protect ourselves, but new technologies and new methods of attack are introduced all the time which requires adjustments to what we do in CyberSecurity.

Keep all software up to date. While it may seem inconvenient to be prompted to restart a program or the whole computer regularly for updates, these updates often correspond to security warnings. Many modern applications help keep themselves up to date, but not all do. If you find yourself using a program that doesn't automatically update, check it regularly for any updates, and research alternatives that automatically update themselves.