Do you know what drugs and proprietary software have in common? You bear the consequences if the product you buy is of mediocre quality
Running your own computing hardware, installation stack, (web) applications, databases, etc., is just not cost effective and usually you won’t be able to commit the required attention to keeping those systems sufficiently secure
Browsing to the wrong webpage is the second major way of getting your laptop, your account and your data compromised
The mandate of the CERN Computer Security Team is simple: to protect the reputation and operations of the Organization from cyber risks. But this simple sentence can quickly become complex: what is the risk?
While CERN has deployed sophisticated measures in an effort to block malicious e-mails before they even arrive in your inbox, not all of them are filtered out: there might still be some that you can read
Let’s keep our Internet presence secure and professional! Let’s apply New York City methods!
Why not try CERN IT’s CERNbox service? It encrypts the transmission of documents during the sharing process, avoids the proliferation of copies by offering a single place to deposit a file, and allows revocation of access
Are you a hacker? Programmer? Software developer? Coder? Many of us are. And, as intelligent humans, we tend to concentrate on the new and not try to reinvent the wheel
Before you embark on your future journey, take care of your digital legacy at CERN
Like any other organisation, institute or enterprise, CERN is under permanent attack by evildoers
Help keep them secure. Discuss “security” with them. Tell them how to protect their digital life, their documents and data, their photos and videos
When using CERN resources, mining for professional purposes lacks any reasonable professional justification