Using IT securely – IT security
Videos & quizzes
How can you tell whether you can trust the content of an e-mail? Is your u:account passwordsecure? Videos and quizzes provide entertaining information on these and other questions relating to IT security.

Webinars for employees (in German)
Experts from the IT security team share knowledge about IT security in the context of everyday work and password managers for daily use – online via Moodle and Zoom. The free webinars take place several times each semester.

Browser
Tips to make the browser use on PCs, laptops, smartphones and tablets more secure.

E-mail
Spot dangers in e-mails and learn more about the actions of the ZID against spam and phishing.

Passwords
Learn how to set a secure password and what to do if you forget it.

Cloud storage
Read how to use cloud storage services such as u:cloud, Dropbox or Google Drive safely.

PC, laptop
More about the secure daily work on PC and laptop and what to do if your device gets lost or stolen.

Smartphone, tablet
Learn more about how to use apps securely and how to protect your device from unwanted access.

Password manager
A password manager helps to create, manage and use individual login credentials.

Sending files
Send large files, files with sensitive content or files to many users securely.

Security objectives
The objective of IT security is to protect data and services. In doing so, three aspects are key:
- Confidentiality
- Integrity
- Availability
It is not possible to provide absolute security. Therefore, the biggest challenge is to analyse risks and implement measures that optimally meet the objectives of the users and the organisation.
IT security is not responsible for the necessary and permitted processing of personal data. For further information about data protection, please visit the website of the Data Protection Officer of the University of Vienna.
Further topics on IT security
Ransomware
How does ransomware get onto my computer and how can I protect myself?

Multi-factor authentication
Find out what multi-factor authentication is and which IT services you can use it for.

Cryptography
An introduction into the topic, typical use cases and an analysis of chances and risks of cryptography.


