Cybersecurity for your personal computer: Difference between revisions

Jump to navigation Jump to search
no edit summary
No edit summary
No edit summary
Line 42: Line 42:
Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied.  You should follow your organization’s policy to protect computers at the workplace.<br> [[Cybersecurity_Basics:Health_Check|Check out our short quiz for a health check on your computer!]]
Computers at the workplace are typically managed and protected by the organization’s IT services team, different sets of security measures may be applied.  You should follow your organization’s policy to protect computers at the workplace.<br> [[Cybersecurity_Basics:Health_Check|Check out our short quiz for a health check on your computer!]]


= Password Hygiene Habits = <!--T:17-->
= Password hygiene habits = <!--T:17-->
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  While this might be through social engineering or phishing, it is frequently the result of weak, guessable passwords and re-used credentials that have been exposed.
Despite many solutions that protect information and systems, stolen usernames and passwords (credentials) are still the most common way attackers gain unauthorized access.  While this might be through social engineering or phishing, it is frequently the result of weak, guessable passwords and re-used credentials that have been exposed.


Line 95: Line 95:
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.
Doing even some of these things will make it more challenging for attackers to target us and our colleagues in phishing attacks, to engage in credential stuffing or password guessing.


= Linux Permissions = <!--T:32-->
= Linux permissions = <!--T:32-->


<!--T:33-->
<!--T:33-->
rsnt_translations
56,430

edits

Navigation menu