Logo des IT-Servicezentrums

Important tips on IT security

Identifying spam emails

You can identify spam emails by carefully checking the following points:

  • Is the sender unknown to you?
  • Is the style unusual? 
  • Is the attachment unexpected? 
  • Are the links incorrect/unexpected? 

If you answer ‘yes’ to more of these points, the more probably it is that the email is malicious. When checking the email address, make sure you check not only the name given but also the address details.

8 points for security & computer protection

Everyday digital life? At work, school or home – nothing works without laptops, tablets and other devices! With these 8 cybersecurity rules, you can create your own protective shield: work safely, surf smartly and stay one step ahead. Be watchful, stay protected!

8 Punkte Sicherheit & Computerschutz

Clients running Windows

Disposal of IT Systems

Defective or unacceptable devices must be registered for disposal with Inventory Management: De-inventorying.

Devices that are still usable but obsolete must be offered for further use at the university in the Inventory Management device exchange.

Before passing on or disposing of the devices, you must ensure that no data or operating system remains on the system. If you need assistance, please contact the ITS helpdesk (tel. 3003).

If you wish to destroy the data yourself, please follow the recommendations of the Federal Office for Information Security: CON.6: Deleting and destroying.

Devices that were procured through framework agreements can be returned to the supplier. If you need assistance, please contact the ITS helpdesk (tel. 3003).

The Central Technical Services Department of the University of Bayreuth is also available to assist you with the disposal of IT systems that have been completely cleared of data: Disposal via ZT.

The solution to your problem not yet found?

No problem! Our team at the ITS Helpdesk will be happy to assist you personally.
Or use our support form or our ITS chatbot.