General
- Contrary to popular belief, the weakest point in a security context is usually the human.
- Almost always there is a contrast between security and usability. (Typical example: password '1234' written on a sticky note versus a randomly generated password learned by heart)
- When thinking in a context of IT security, it is better to worry than to be sorry.
- Almost by definition there is no perfectly secure system. Therefore, IT security is based on "trust". If doing sensible tasks (like entering your password) you should trust your hardware and your network connection.
- If in doubt, ask your IT crew.