Cybersecurity for your personal computer: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 5: Line 5:
<translate>
<translate>


== Context == <!--T:1-->


<!--T:2-->
== Basics of Cybersecurity at the Alliance== <!--T:4-->
Cyber criminals spend their days trying to deceive us into giving up our information, tamper with our devices and even steal our identities. When cyberattacks like phishing are successful, they can ruin our days, to put it lightly. That’s why, this Cybersecurity Awareness Month, we’re encouraging Members of the Alliance and the Federation to ruin a cybercriminal’s day!
 
<!--T:3-->
For October Cybersecurity Awareness Month, the National Security Council’s Cybersecurity Training and Awareness Team is sharing resources and planning a series of workshops to help Members of the Alliance and the Federation improve their security knowledge and awareness.
 
 
 
== Our Four Topics == <!--T:4-->
 
<!--T:5-->
We have selected four topics this year:


<!--T:6-->
<!--T:6-->
Line 162: Line 150:


=== Safe Browsing and MFA  === <!--T:24-->
=== Safe Browsing and MFA  === <!--T:24-->
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance Federation.
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance.


<!--T:25-->
<!--T:25-->
Line 174: Line 162:


<!--T:28-->
<!--T:28-->
When authenticating to online accounts, we can use different identities/usernames/emails for different services; separate work and personal accounts; practice good password hygiene (see our password tips above); and enroll in the MFA schemes provided by online service providers (join the MFA presentation with Ryan and Pier-luc).
When authenticating to online accounts, we can use different identities/usernames/emails for different services; separate work and personal accounts; practice good password hygiene (see our password tips above); and enroll in the MFA schemes provided by online service providers.


<!--T:29-->
<!--T:29-->
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.
<!--T:30-->
Join our workshop on October, XXX where we will provide an overview of MFA project!
<!--T:31-->
Session in English: <br/>
Session in French:


=== Linux Permissions === <!--T:32-->
=== Linux Permissions === <!--T:32-->
Line 216: Line 195:
<!--T:40-->
<!--T:40-->
[https://docs.alliancecan.ca/wiki/Sharing_data#Access_control_lists_.28ACLs.29 Managing ACLs (Access Control Lists)] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible.  
[https://docs.alliancecan.ca/wiki/Sharing_data#Access_control_lists_.28ACLs.29 Managing ACLs (Access Control Lists)] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible.  
<!--T:41-->
Interested in learning more on this topic? Join our workshop on October, 27 from 12 p.m. - 2 p.m. ET where we will take a deeper dive into Linux permissions!
<!--T:42-->
Session in English: <br/>
Session in French:


</translate>
</translate>
cc_staff
169

edits