Tips for users

The IT security team of the University of Vienna has compiled a comprehensive list of tips for students and employees to make daily work on the computer – be it on desktop, laptop or mobile devices – more secure.

 Direct links

Form Report a vulnerability

Place request for IT security


Video: „How to stay safe in the digital world“ (in German)

Duration: 55 seconds

Tips by topic


Illustration – browser

Tips to make the browser use on PCs, laptops, smartphones and tablets more secure.

To the browser tips


Illustration – e-mail

Spot dangers in e-mails and learn more about the actions of the ZID against spam and phishing.

To the e-mail tips

Cloud storage

Illustration – cloud storage

Read how to use cloud storage services such as u:cloud, Dropbox or Google Drive safely.

To the cloud storage tips

PC, laptop

Illustration – PC, laptop

More about the secure daily work on PC and laptop and what to do if your device gets lost or stolen.

To the tips for PC, laptop

Smartphone, tablet

Illustration – smartphone, tablet

Learn more about how to use apps securely and how to protect your device from unwanted access.

To the tips for smartphone, tablet

Password manager

Illustration – password manager

A password manager helps to create, manage and use individual login credentials.

To the password manager tips

Security objectives

The objective of IT security is to protect data and services. In doing so, three aspects are key:

  • Confidentiality
  • Integrity
  • Availability

It is not possible to provide absolute security. Therefore, the biggest challenge is to analyse risks and implement measures that optimally meet the objectives of the users and the organisation.

IT security is not responsible for the necessary and permitted processing of personal data. For further information about data protection, please visit the website of the Data Protection Officer of the University of Vienna.

Implementing tips

Some of the tips listed below require advanced user skills as well as administrator access to the device. They are targeted at employees of the ZID, IT representatives at organisational units as well as users who manage their devices themselves (e.g. students).


Do research online and use the information provided by the device and software manufacturers to check or update the current configurations of your device.