IT security

IT security commandments

Users should never lose sight of some basic rules when dealing with IT services. The ZID has formulated IT security commandments for this purpose.

To the 12 IT security commandments

Multi-factor authentication

The use of the VPN service is more secure than ever: the login is now only possible with multi-factor authentication (MFA).

VPN: Next stage for data security

Tips for users


Illustration – browser

Tips to make the browser use on PCs, laptops, smartphones and tablets more secure.

To the browser tips


Illustration – e-mail

Spot dangers in e-mails and learn more about the actions of the ZID against spam and phishing.

To the e-mail tips

Cloud storage

Illustration – cloud storage

Read how to use third-party cloud storage services such as u:cloud, Dropbox or Google Drive safely.

To the cloud storage tips

PC, laptop

Illustration – PC, laptop

More about the secure daily work on PC and laptop and what to do if your device gets lost or stolen.

To the tips for PC, laptop

Smartphone, tablet

Illustration – smartphone, tablet

Learn more about how to use apps securely and how to protect your device from unwanted access.

To the tips for smartphone, tablet

Password manager

Illustration – password manager

A password manager helps to create, manage and use individual login credentials.

To the password manager tips

Further topics on IT security


Illustration ransomware

How does the university protect itself from such attacks? Interview

How does ransomware get onto my computer and how can I protect myself? More information (in German)


Illustration – cryptography

An introduction into the topic, typical use cases and an analysis of chances and risks of cryptography. 

To cryptography (in German)

External boot medium

Illustration – Desinfec’t boot medium

An external boot medium can help you to spot and remove malware.

To the external boot medium

IT security services


Illustration – contact

Use the respective servicedesk-forms to contact the IT security team of the ZID – for example to report a phishing e-mail, a vulnerability or a lost device at the University of Vienna or to ask a general question about IT security.