Welcome to CERN! For the next couple of weeks, you will be able to breathe in the free academic world of CERN
Before you embark on your future journey, take care of your digital legacy at CERN
Like any other organisation, institute or enterprise, CERN is under permanent attack by evildoers
Help keep them secure. Discuss “security” with them. Tell them how to protect their digital life, their documents and data, their photos and videos
When using CERN resources, mining for professional purposes lacks any reasonable professional justification
Protect CERN, protect yourself! Using applications without a valid licence will lead to repercussions
Protect yourself and your family! Protect your private life! And once you have done that, protect your professional life and your CERN devices, too!
Linux and MacOS folks: do as the Windows people do. Be diligent when receiving unsolicited e-mails with weird attachments
Following up on some questions we received concerning our last Bulletin article, let us expand on the easiest way to lose your CERN password…
Money has always been a catalyst for greed and malice. Blackmail is one way to extort money from the innocent and has existed since ancient times
Do you like listening to music while you work? What about watching videos during your leisure time at CERN?
What do some webcams, cameras, video-conferencing cameras, control devices and Internet-of-Things devices connected to CERN networks have in common?