If you take advantage of the plethora of software snippets, code excerpts, libraries and the like circulating on the Internet, don’t forget that there’s a risk: is the code safe? Bug-free? Maintained? And free of any malicious components?
For the protection of your digital assets, photos, films, documents, banking access, social media, etc., make sure that you apply cyber-security best practices
Using the CERN e-mail service gives you some flexibility, but some current practices can have severe implications for password secrecy and the confidentiality of certain documents sent by e-mail
Once you are connected to CERN’s wired or wireless networks, you are bound by CERN’s Computing Rules, which requires you to always keep your system up-to-date, fully patched and protected against unauthorised access
“Serious gaming” is the gamification of training for professional purposes. When you play a serious game, you are actually also improving your knowledge on a particular subject
The mandate of the CERN Computer Security Team is simple: to protect the reputation and operations of the Organization from cyber risks. But this simple sentence can quickly become complex: what is the risk?