Cybersecurity for your personal computer: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 5: Line 5:




== Basics of Cybersecurity at the Alliance== <!--T:4-->


<!--T:6-->
* Basic Computer Hygiene
* Password Hygiene Habits
* Safe Browsing and MFA
* Linux Permissions


=== Basic Computer Hygiene === <!--T:7-->
= Basic computer hygiene = <!--T:7-->


<!--T:8-->
<!--T:8-->
Line 19: Line 13:
In this section, we have a few tips for you to enhance your computer’s security, and a [[Cybersecurity_Basics:Health_Check|short quiz for a health check on your computer]].
In this section, we have a few tips for you to enhance your computer’s security, and a [[Cybersecurity_Basics:Health_Check|short quiz for a health check on your computer]].


==== Security Updates ==== <!--T:9-->
== Security updates == <!--T:9-->
Enable “Install Update Automatically” to allow timely installation of security updates on your operating system and software.<br>
Enable “Install Update Automatically” to allow timely installation of security updates on your operating system and software.<br>


For more information, please visit [https://www.getcybersafe.gc.ca/en/blogs/software-updates-why-they-matter-cyber-security Software updates: Why they matter for cybersecurity].
For more information, please visit [https://www.getcybersafe.gc.ca/en/blogs/software-updates-why-they-matter-cyber-security Software updates: Why they matter for cybersecurity].
   
   
==== Passwords ==== <!--T:10-->
== Passwords == <!--T:10-->
Strong passwords are essential to keep your computer and your accounts secured.  Refer to [https://docs.alliancecan.ca/wiki/Cybersecurity_Basics#Password_Hygiene_Habits Password Hygiene Habits] for more tips.
Strong passwords are essential to keep your computer and your accounts secured.  Refer to [https://docs.alliancecan.ca/wiki/Cybersecurity_Basics#Password_Hygiene_Habits Password Hygiene Habits] for more tips.
   
   
==== Antivirus ====
== Antivirus ==
To prevent your computer from malware infection, install an antivirus software on your computer and keep it updated.
To prevent your computer from malware infection, install an antivirus software on your computer and keep it updated.
   
   
==== Phishing ====
== Phishing ==
Pay attention to the hyperlinks attached in emails or search engine results before you click on them, a hyperlink containing a weird domain name is a strong signal of malicious activities.<br>
Pay attention to the hyperlinks attached in emails or search engine results before you click on them, a hyperlink containing a weird domain name is a strong signal of malicious activities.<br>
For more information, please visit [https://www.getcybersafe.gc.ca/en/blogs/signs-phishing-campaign-how-keep-yourself-safe Signs of a phishing campaign: How to keep yourself safe].
For more information, please visit [https://www.getcybersafe.gc.ca/en/blogs/signs-phishing-campaign-how-keep-yourself-safe Signs of a phishing campaign: How to keep yourself safe].


==== Wi-Fi security ==== <!--T:11-->
== Wi-Fi security == <!--T:11-->
To protect the Wi-Fi network at your home, set a strong Wi-Fi password and update your router’s firmware regularly.<br>
To protect the Wi-Fi network at your home, set a strong Wi-Fi password and update your router’s firmware regularly.<br>
   
   
Line 42: Line 36:
For more information, please visit [https://www.getcybersafe.gc.ca/en/secure-your-connections/private-networks Private networks] and [https://www.getcybersafe.gc.ca/en/secure-your-connections/public-wi-fi Public Wi-Fi].
For more information, please visit [https://www.getcybersafe.gc.ca/en/secure-your-connections/private-networks Private networks] and [https://www.getcybersafe.gc.ca/en/secure-your-connections/public-wi-fi Public Wi-Fi].


==== Important notes ==== <!--T:13-->
== Important notes == <!--T:13-->


<!--T:14-->
<!--T:14-->
Line 48: Line 42:
Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied.  You should follow your organization’s policy to protect computers at the workplace.<br> [[Cybersecurity_Basics:Health_Check|Check out our short quiz for a health check on your computer!]]
Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied.  You should follow your organization’s policy to protect computers at the workplace.<br> [[Cybersecurity_Basics:Health_Check|Check out our short quiz for a health check on your computer!]]


=== Password Hygiene Habits === <!--T:17-->
= Password Hygiene Habits = <!--T:17-->
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  While this might be through social engineering or phishing, it is frequently the result of weak, guessable passwords and re-used credentials that have been exposed.
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  While this might be through social engineering or phishing, it is frequently the result of weak, guessable passwords and re-used credentials that have been exposed.


Line 83: Line 77:
If this is not your current situation: '''Don’t Panic!''' just start making changes today. Every little bit helps. If you have hundreds of passwords you need to change, start with a few of them, do a couple every day at lunch. Every time you make even one set of credentials more secure you’re doing yourself a big favour.
If this is not your current situation: '''Don’t Panic!''' just start making changes today. Every little bit helps. If you have hundreds of passwords you need to change, start with a few of them, do a couple every day at lunch. Every time you make even one set of credentials more secure you’re doing yourself a big favour.


=== Safe Browsing and MFA  === <!--T:24-->
= Safe browsing and MFA  = <!--T:24-->
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance.
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance.


Line 101: Line 95:
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.


=== Linux Permissions === <!--T:32-->
= Linux Permissions = <!--T:32-->


<!--T:33-->
<!--T:33-->
rsnt_translations
56,430

edits