cybersecuritybasics
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | Last revisionBoth sides next revision | ||
cybersecuritybasics [2022/10/28 18:40] – [Wires Rock] jgmac1106 | cybersecuritybasics [2022/10/28 19:32] – [Separation of Duties] jgmac1106 | ||
---|---|---|---|
Line 49: | Line 49: | ||
Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, | Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, | ||
- | Then make yourself a second user. This user will connect to external systems like we apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application. | + | Then make yourself a second user. This user will connect to external systems like web apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application. |
===== Backups ===== | ===== Backups ===== |
cybersecuritybasics.txt · Last modified: 2022/10/28 19:34 by jgmac1106