Using the CERN e-mail service gives you some flexibility, but some current practices can have severe implications for password secrecy and the confidentiality of certain documents sent by e-mail
Once you are connected to CERN’s wired or wireless networks, you are bound by CERN’s Computing Rules, which requires you to always keep your system up-to-date, fully patched and protected against unauthorised access
“Serious gaming” is the gamification of training for professional purposes. When you play a serious game, you are actually also improving your knowledge on a particular subject
The mandate of the CERN Computer Security Team is simple: to protect the reputation and operations of the Organization from cyber risks. But this simple sentence can quickly become complex: what is the risk?
While CERN has deployed sophisticated measures in an effort to block malicious e-mails before they even arrive in your inbox, not all of them are filtered out: there might still be some that you can read
Why not try CERN IT’s CERNbox service? It encrypts the transmission of documents during the sharing process, avoids the proliferation of copies by offering a single place to deposit a file, and allows revocation of access