rsnt_translations
56,430
edits
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
= | = Best practices = <!--T:7--> | ||
<!--T:8--> | <!--T:8--> | ||
Don’t know how to keep your computer secure | Don’t know how to keep your personal computer secure? Want to review the security level of your computer?<br> | ||
Here are a few tips to enhance your computer’s security. If you’d like to evaluate its security level, you might like to take this [[Cybersecurity_Basics:Health_Check|short quiz for a health check on your computer]]. | |||
== Security updates == <!--T:9--> | == Security updates == <!--T:9--> | ||
Enable “Install Update Automatically” to allow timely installation of security updates on your operating system and software.<br> | Enable “Install Update Automatically” to allow timely installation of security updates on your operating system and software.<br> | ||
For more information, | For more information, see [https://www.getcybersafe.gc.ca/en/blogs/software-updates-why-they-matter-cyber-security Software updates: Why they matter for cybersecurity]. | ||
== Passwords == <!--T:10--> | == Passwords == <!--T:10--> | ||
Line 25: | Line 25: | ||
== Phishing == | == Phishing == | ||
Pay attention to the hyperlinks | Pay attention to the hyperlinks contained in emails or search engine results before you click on them. A hyperlink containing a weird domain name is a strong signal of malicious activities.<br> | ||
For more information, | For more information, see [https://www.getcybersafe.gc.ca/en/blogs/signs-phishing-campaign-how-keep-yourself-safe Signs of a phishing campaign: How to keep yourself safe]. | ||
== Wi-Fi security == <!--T:11--> | == Wi-Fi security == <!--T:11--> | ||
Line 34: | Line 34: | ||
<!--T:12--> | <!--T:12--> | ||
For more information, | For more information, see [https://www.getcybersafe.gc.ca/en/secure-your-connections/private-networks Private networks] and [https://www.getcybersafe.gc.ca/en/secure-your-connections/public-wi-fi Public Wi-Fi]. | ||
== Important notes == <!--T:13--> | == Important notes == <!--T:13--> | ||
Line 40: | Line 40: | ||
<!--T:14--> | <!--T:14--> | ||
The advice above is mainly for individuals to refresh their cybersecurity awareness and improve cyber defense on their personal computers.<br> | The advice above is mainly for individuals to refresh their cybersecurity awareness and improve cyber defense on their personal computers.<br> | ||
Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied. You should follow your organization’s policy to protect computers at the workplace.<br> [[ | Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied. You should follow your organization’s policy to protect computers at the workplace.<br> [[Cybersecurity_Basics:Health_Check|Check out our short quiz for a health check on your computer!]] | ||
= Password hygiene habits = <!--T:17--> | = Password hygiene habits = <!--T:17--> |