Sysadmin Chores

New sysadmin lecture
As ~sircmpwn said on this specific page for newbie sysadmins under CC BY-SA 2.0, formatted in Markdown for clarity:

Spear phishing attacks
Since I'm have elevated access to not only my servers, but to future production servers owned by me through Recap Time Squad, I'm may be an possible victim of spear phishing attacks through social engineering way.

GPG identity verification
Ask someone who requests to do an destructive action to sign their request with GPG to confirm their action, using the following text. If they didn't complete the key signing party procedures and you're in doubt about the action they want to do through your sysadmin privilege, you should attempt to