While CERN has deployed sophisticated measures in an effort to block malicious e-mails before they even arrive in your inbox, not all of them are filtered out: there might still be some that you can read
Let’s keep our Internet presence secure and professional! Let’s apply New York City methods!
Why not try CERN IT’s CERNbox service? It encrypts the transmission of documents during the sharing process, avoids the proliferation of copies by offering a single place to deposit a file, and allows revocation of access
Are you a hacker? Programmer? Software developer? Coder? Many of us are. And, as intelligent humans, we tend to concentrate on the new and not try to reinvent the wheel
Before you embark on your future journey, take care of your digital legacy at CERN
Like any other organisation, institute or enterprise, CERN is under permanent attack by evildoers
Help keep them secure. Discuss “security” with them. Tell them how to protect their digital life, their documents and data, their photos and videos
When using CERN resources, mining for professional purposes lacks any reasonable professional justification
Protect CERN, protect yourself! Using applications without a valid licence will lead to repercussions
Protect yourself and your family! Protect your private life! And once you have done that, protect your professional life and your CERN devices, too!
Linux and MacOS folks: do as the Windows people do. Be diligent when receiving unsolicited e-mails with weird attachments
Following up on some questions we received concerning our last Bulletin article, let us expand on the easiest way to lose your CERN password…