cc_staff
169
edits
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
<translate> | <translate> | ||
== Basics of Cybersecurity at the Alliance== <!--T:4--> | |||
<!--T:6--> | <!--T:6--> | ||
Line 162: | Line 150: | ||
=== Safe Browsing and MFA === <!--T:24--> | === Safe Browsing and MFA === <!--T:24--> | ||
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance | We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance. | ||
<!--T:25--> | <!--T:25--> | ||
Line 174: | Line 162: | ||
<!--T:28--> | <!--T:28--> | ||
When authenticating to online accounts, we can use different identities/usernames/emails for different services; separate work and personal accounts; practice good password hygiene (see our password tips above); and enroll in the MFA schemes provided by online service providers | When authenticating to online accounts, we can use different identities/usernames/emails for different services; separate work and personal accounts; practice good password hygiene (see our password tips above); and enroll in the MFA schemes provided by online service providers. | ||
<!--T:29--> | <!--T:29--> | ||
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing. | Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing. | ||
=== Linux Permissions === <!--T:32--> | === Linux Permissions === <!--T:32--> | ||
Line 216: | Line 195: | ||
<!--T:40--> | <!--T:40--> | ||
[https://docs.alliancecan.ca/wiki/Sharing_data#Access_control_lists_.28ACLs.29 Managing ACLs (Access Control Lists)] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible. | [https://docs.alliancecan.ca/wiki/Sharing_data#Access_control_lists_.28ACLs.29 Managing ACLs (Access Control Lists)] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible. | ||
</translate> | </translate> |