38,760
edits
(Updating to match new version of source page) Tags: Mobile edit Mobile web edit |
(Updating to match new version of source page) |
||
Line 6: | Line 6: | ||
== Password best practices == | == Password best practices == | ||
* Users are strongly encouraged to use unique passwords, and to never reuse them. | * Users are strongly encouraged to use unique passwords, and to never reuse them. | ||
* Passwords are sensitive confidential information and users must never share or disclose them by any | * Passwords are sensitive confidential information and users must never share or disclose them by any means. Users should also refrain from disclosing tips that could help identify their passwords. | ||
* Users are encouraged to never write down a password. In the situation where a user needs to write or store his password on a given media, it is acceptable to do so given that the appropriate security measures to prevent unauthorized access are in place (encryption, strong password protection, etc.). A user should never store or write a password to facilitate access or transfer between information systems. | * Users are encouraged to never write down a password. In the situation where a user needs to write or store his password on a given media, it is acceptable to do so given that the appropriate security measures to prevent unauthorized access are in place (encryption, strong password protection, etc.). A user should never store or write a password to facilitate access or transfer between information systems. | ||
* Users are encouraged to not use the "remember your password" feature of browser or operating systems. | * Users are encouraged to not use the "remember your password" feature of browser or operating systems. | ||
Line 21: | Line 21: | ||
= General best practices = | = General best practices = | ||
== Sharing data == | == Sharing data == | ||
When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page. | When trying to share data, it can be considered convenient to change filesystem permissions to allow everyone to read or write to some files. This can compromise your account if not done properly. Please see our [[Sharing data]] page. | ||
== For the system you log in from == | |||
Security issues often start on the outside, by a third party getting access to a user's password or (passwordless) ssh key. To help prevent this, please: | |||
* Log in from trusted computers only; | |||
* On Windows computers, make sure to regularly run a virus scanner and malware scanner; | |||
* On all system, keep up to date with security updates for all software; | |||
* Do leave your computer or laptop unattended. |