Important tips on IT security
Identifying spam emails
You can identify spam emails by carefully checking the following points:
- Is the sender unknown to you?
- Is the style unusual?
- Is the attachment unexpected?
- Are the links incorrect/unexpected?
If you answer ‘yes’ to more of these points, the more probably it is that the email is malicious. When checking the email address, make sure you check not only the name given but also the address details.
8 points for security & computer protection
Everyday digital life? At work, school or home – nothing works without laptops, tablets and other devices! With these 8 cybersecurity rules, you can create your own protective shield: work safely, surf smartly and stay one step ahead. Be watchful, stay protected!

- Malware protection Activate existing malware protection, e.g. Windows Defender.
- Keep malware protection up to date.
- AEP (Advanced Endpoint Protection) is useful but more expensive.
- Take malware protection warnings seriously.
- Activate your existing firewall, e.g. Windows Firewall
- Activate the firewall on your router at home
- Use whitelisting, i.e. approve programmes
- Take firewall warnings carefully.
- Activation in operating systems such as Windows and Linux
- Check that applications are included
- Activate automatic updates Install updates promptly
- Only use the update pause function in extreme cases
- Check emails carefully
- Check links in emails carefully
- If in doubt, contact the sender
- Visit the online training course on handling emails on the video server
- Use trusted app stores
- For open source: use trusted servers
- Take security warnings seriously during installation
- Minimum 10-12 characters, different characters
- Observe password policy
- Different password for each access
- Visit online training course about passwords on the video server
- Backup to external media, e.g. external hard drive
- Disconnect backup media when no backup is running
- Two data backups are helpful
- MyFiles have strong data backup
- Visit training courses on the video server; many topics are available
- Each semester, attend Information Security Week
- Each semester, visit the information stands
- Departments, etc. can request face-to-face training courses
Clients running Windows
Securing printers
Securing Bluetooth
Cloud services
Disposal of IT Systems
Defective or unacceptable devices must be registered for disposal with Inventory Management: De-inventorying.
Devices that are still usable but obsolete must be offered for further use at the university in the Inventory Management device exchange.
Before passing on or disposing of the devices, you must ensure that no data or operating system remains on the system. If you need assistance, please contact the ITS helpdesk (tel. 3003).
If you wish to destroy the data yourself, please follow the recommendations of the Federal Office for Information Security: CON.6: Deleting and destroying.
Devices that were procured through framework agreements can be returned to the supplier. If you need assistance, please contact the ITS helpdesk (tel. 3003).
The Central Technical Services Department of the University of Bayreuth is also available to assist you with the disposal of IT systems that have been completely cleared of data: Disposal via ZT.
The solution to your problem not yet found?
No problem! Our team at the ITS Helpdesk will be happy to assist you personally.
Or use our support form or our ITS chatbot.
